The art of software security assessment : identifying and preventing software vulnerabilities

著者

    • Dowd, Mark
    • McDonald, John
    • Schuh, Justin

書誌事項

The art of software security assessment : identifying and preventing software vulnerabilities

Mark Dowd, John McDonald, and Justin Schuh

Addison-Wesley, c2007

  • pbk. : alk. paper

大学図書館所蔵 件 / 3

この図書・雑誌をさがす

注記

Includes bibliographical references (p.1125-1128) and index

HTTP:URL=http://www.loc.gov/catdir/toc/ecip0618/2006023446.html Information=Table of contents only

内容説明・目次

内容説明

Note: This is now a 2 volume set which is shrink wrapped. Computer software is an integral part of modern society. Companies rely on applications to manage client information, payment data, and inventory tracking. Consumers use software for a variety of different reasons as well--to manage their daily lives, to communicate with friends and family, and to browse resources made available on the internet, to name a few. With such a heavy reliance on software in our society, questions surrounding the security of the pieces of software performing these various tasks begin to arise. Is the software we are using really secure? How can we verify that it is? And what are the implications of a particular application being compromised? These are some of the questions that this book attempts to address. This book sheds light on the theory and practice of code auditing--how to rip apart an application and discover security vulnerabilities.

目次

ABOUT THE AUTHORS xv PREFACE xvii ACKNOWLEDGMENTS xxi I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 67 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459 10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129

「Nielsen BookData」 より

詳細情報

ページトップへ