Art of Software Security Assessment, The (eBook)
1200 Seiten
Pearson Education (Verlag)
978-0-13-270193-8 (ISBN)
Note: CD-ROM/DVD and other supplementary materials are not included.
This is the eBook version of the printed book.
The Definitive Insider's Guide to Auditing Software Security
This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for 'ripping apart' applications to reveal even the most subtle and well-hidden security flaws.
The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.
Coverage includesCode auditing: theory, practice, proven methodologies, and secrets of the tradeBridging the gap between secure software design and post-implementation reviewPerforming architectural assessment: design review, threat modeling, and operational reviewIdentifying vulnerabilities related to memory management, data types, and malformed dataUNIX/Linux assessment: privileges, files, and processesWindows-specific issues, including objects and the filesystemAuditing interprocess communication, synchronization, and stateEvaluating network software: IP stacks, firewalls, and common application protocolsAuditing Web applications and technologies
This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.
The Definitive Insider's Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "e;ripping apart"e; applications to reveal even the most subtle and well-hidden security flaws. The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications. Coverage includes * Code auditing: theory, practice, proven methodologies, and secrets of the trade * Bridging the gap between secure software design and post-implementation review * Performing architectural assessment: design review, threat modeling, and operational review * Identifying vulnerabilities related to memory management, data types, and malformed data * UNIX/Linux assessment: privileges, files, and processes * Windows-specific issues, including objects and the filesystem * Auditing interprocess communication, synchronization, and state * Evaluating network software: IP stacks, firewalls, and common application protocols * Auditing Web applications and technologies
Erscheint lt. Verlag | 20.11.2006 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Mathematik / Informatik ► Informatik ► Software Entwicklung | |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 0-13-270193-6 / 0132701936 |
ISBN-13 | 978-0-13-270193-8 / 9780132701938 |
Haben Sie eine Frage zum Produkt? |
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: EPUB (Electronic Publication)
EPUB ist ein offener Standard für eBooks und eignet sich besonders zur Darstellung von Belletristik und Sachbüchern. Der Fließtext wird dynamisch an die Display- und Schriftgröße angepasst. Auch für mobile Lesegeräte ist EPUB daher gut geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich