TAILIEUCHUNG - Exploiting Software How to Break Code eBook-kB

Software security is gaining momentum as security professionals realize that computer security is really all about making software behave. The publication of Building Secure Software in 2001 (Viega and McGraw) unleashed a number of related books that have crystallized software security as a critical field. Already, security professionals, software developers, and business leaders are resonating with the message and asking for more. | Table of Contents Index Exploiting Software How to Break Code ByGreg Hoglund Gary McGraw Publisher Addison Wesley Pub Date February 17 2004 ISBN 0-201-78695-8 Pages 512 How does software break How do attackers make software break on purpose Why are firewalls intrusion detection systems and antivirus software not keeping out the bad guys What tools can be used to break software This book provides the answers. Exploiting Software is loaded with examples of real attacks attack patterns tools and techniques used by bad guys to break software. If you want to protect your software from attack you must first learn how real attacks are really carried out. This must-have book may shock you and it will certainly educate beyond the script kiddie treatment found in many hacking books you will learn about Why software exploit will continue to be a serious problem When network security mechanisms do not work Attack patterns Reverse engineering Classic attacks against server software Surprising attacks against client software Techniques for crafting malicious input The technical details of buffer overflows Rootkits Exploiting Softwareis filled with the tools concepts and knowledge necessary to break software. Table of Contents Index Exploiting Software How to Break Code ByGreg Hoglund Gary McGraw Publisher Addison Wesley Pub Date February 17 2004 ISBN 0-201-78695-8 Pages 512 Copyright Praise for Exploiting Software Attack Patterns Foreword Preface What This Book Is About How to Use This Book But Isn t This Too Dangerous Acknowledgments Greg s Acknowledgments Gary s Acknowledgments Chapter 1. Software The Root of the Problem A Brief History of Software Bad Software Is Ubiquitous The Trinity of Trouble The Future of Software What Is Software Security Conclusion Chapter 2. Attack Patterns A Taxonomy An Open-Systems View Tour of an Exploit Attack Patterns Blueprints for Disaster An Example Exploit Microsoft s Broken C Compiler Applying Attack Patterns Attack Pattern .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.