Exploiting Software: How to Break Code (Addison-Wesley Software Security)
Hoglund, Greg, McGraw, Gary
Used - Soft cover
Condition: Used - Good
Ships from Germany to U.S.A.
Quantity: 1 available
Add to basketCondition: Used - Good
Quantity: 1 available
Add to basketBefriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
Seller Inventory # M00201786958-G
**Foreword by Avi Rubin. How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. This book is studded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out. Learn about: Why software exploit will continue to be a serious problem; When network security mechanisms do not work; Attack patterns; Reverse engineering; Classic attacks against server software; Surprising attacks against client software; Techniques for crafting malicious input; The technical details of buffer overflows; and Rootkits. This information needs to be understood and digested by security professionals so that they know the magnitude of the problem and they can begin to address it properly. Today, all developers should be security-minded. The knowledge here will arm you with a real understanding of the software security problem.
Greg Hoglund has been a pioneer in the area of software security. He is CEO of HBGary, Inc., a leading provider of software security verification services. After writing one of the first network vulnerability scanners (installed in over half of all Fortune 500 companies), he created and documented the first Windows NT-based rootkit, founding rootkit.com in the process. Greg is a frequent speaker at Black Hat, RSA, and other security conferences.
Gary McGraw, Cigital's CTO, is a leading authority on software security. Dr. McGraw is coauthor of the groundbreaking books Building Secure Software and Exploiting Software (both from Addison-Wesley). While consulting for major software producers and consumers, he has published over ninety peer-reviewed technical publications, and functions as principal investigator on grants from DARPA, the National Science Foundation, and NIST's Advanced Technology Program. He serves on the advisory boards of Authentica, Counterpane, and Fortify Software. He is also an advisor to the computer science departments at University of California, Davis, and the University of Virginia, as well as the School of Informatics at Indiana University.
"About this title" may belong to another edition of this title.
1. Scope
For all orders via our store on the AbeBooks Marketplace, the following terms and conditions apply. Unless otherwise agreed, the inclusion of any terms and conditions of your own used by you is contradicted.
2. contracting party, conclusion of contract, correction options
The purchase contract is concluded with momox SE.
The subject of the contract is the sale of goods.
If an article is posted by us on AbeBooks, the activation of the offer page on AbeBooks is the binding offer to conclu...
| Order quantity | 10 to 20 business days | 10 to 20 business days |
|---|---|---|
| First item | US$ 11.74 | US$ 17.60 |
Delivery times are set by sellers and vary by carrier and location. Orders passing through Customs may face delays and buyers are responsible for any associated duties or fees. Sellers may contact you regarding additional charges to cover any increased costs to ship your items.