Cargando…

The art of software security assessment : identifying and preventing software vulnerabilities /

"There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude."--Halvar Flake, CEO and head of research, SABRE Security GmbH Note: This is now a 2 volume set which is sh...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Dowd, Mark
Otros Autores: McDonald, John, 1977-, Schuh, Justin
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Indianapolis, Ind. : Addison Wesley Professional, 2006.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Software vulnerability fundamentals
  • 2. Design review
  • 3. Operational review
  • 4. Application review process
  • 5. Memory corruption
  • 6. C language issues
  • 7. Program building blocks
  • 8. Strings and metacharacters
  • 9. UNIX I : privileges and files
  • 10. UNIX II : processes
  • 11. Windows I : objects and the file system
  • 12. Windows II : interprocess communication
  • 13. Synchronization and state
  • 14. Network protocols
  • 15. Firewalls
  • 16. Network application protocols
  • 17. Web applications
  • 18. Web technologies.