The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, y Justin Schuh
Tipo de material: TextoDetalles de publicación: Upper Saddle River, NJ : Addison-Wesley, ©2013Edición: 1a ediciónDescripción: xxi, 1174 páginas : ilustraciones ; 24 x 18 centímetrosTipo de contenido:- texto
- sin medio
- volumen
- 0321444426
- 9780321444424
- QA 76 .9 .A25 D74 2013
Tipo de ítem | Biblioteca actual | Biblioteca de origen | Colección | Signatura topográfica | Copia número | Estado | Notas | Fecha de vencimiento | Código de barras | Reserva de ítems | |
---|---|---|---|---|---|---|---|---|---|---|---|
Libros para consulta en sala | Biblioteca Antonio Enriquez Savignac | Biblioteca Antonio Enriquez Savignac | COLECCIÓN RESERVA | QA 76 .9 .A25 D74 2013 (Navegar estantería(Abre debajo)) | 1 | No para préstamo | Ing. Telematica | 036645 |
Incluye bibliografía: páginas 1125-1128 e índice
I Introduction to software security assessment -- Software vulnerability fundamentals -- Design review -- Operational review -- Application review process - II Software vulnerabilities -- Memory corruption -- C language issues -- Program building blocks -- Strings and metacharacters -- UNIX I : privileges and files -- UNIX II : processes -- Windows I : objects and the file system -- Windows II : interprocess communication -- Synchronization and state - III Software vulnerabilities in practice -- Network protocols -- Firewalls -- Network application protocols -- Web applications -- Web technologies.
" The Definitive Insider's Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws." -- P. [4]
PIT
NUEVOSTELEMAT