PARA TODA NECESIDAD SIEMPRE HAY UN LIBRO

Imagen de Google Jackets

The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, y Justin Schuh

Por: Colaborador(es): Tipo de material: TextoTextoDetalles de publicación: Upper Saddle River, NJ : Addison-Wesley, ©2013Edición: 1a ediciónDescripción: xxi, 1174 páginas : ilustraciones ; 24 x 18 centímetrosTipo de contenido:
  • texto
Tipo de medio:
  • sin medio
Tipo de soporte:
  • volumen
ISBN:
  • 0321444426
  • 9780321444424
Tema(s): Clasificación LoC:
  • QA 76 .9 .A25 D74 2013
Contenidos:
I Introduction to software security assessment -- Software vulnerability fundamentals -- Design review -- Operational review -- Application review process - II Software vulnerabilities -- Memory corruption -- C language issues -- Program building blocks -- Strings and metacharacters -- UNIX I : privileges and files -- UNIX II : processes -- Windows I : objects and the file system -- Windows II : interprocess communication -- Synchronization and state - III Software vulnerabilities in practice -- Network protocols -- Firewalls -- Network application protocols -- Web applications -- Web technologies.
Resumen: " The Definitive Insider's Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws." -- P. [4]
Etiquetas de esta biblioteca: No hay etiquetas de esta biblioteca para este título. Ingresar para agregar etiquetas.
Valoración
    Valoración media: 0.0 (0 votos)
Existencias
Tipo de ítem Biblioteca actual Biblioteca de origen Colección Signatura topográfica Copia número Estado Notas Fecha de vencimiento Código de barras Reserva de ítems
Libros para consulta en sala Libros para consulta en sala Biblioteca Antonio Enriquez Savignac Biblioteca Antonio Enriquez Savignac COLECCIÓN RESERVA QA 76 .9 .A25 D74 2013 (Navegar estantería(Abre debajo)) 1 No para préstamo Ing. Telematica 036645
Total de reservas: 0

Incluye bibliografía: páginas 1125-1128 e índice

I Introduction to software security assessment -- Software vulnerability fundamentals -- Design review -- Operational review -- Application review process - II Software vulnerabilities -- Memory corruption -- C language issues -- Program building blocks -- Strings and metacharacters -- UNIX I : privileges and files -- UNIX II : processes -- Windows I : objects and the file system -- Windows II : interprocess communication -- Synchronization and state - III Software vulnerabilities in practice -- Network protocols -- Firewalls -- Network application protocols -- Web applications -- Web technologies.

" The Definitive Insider's Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws." -- P. [4]

PIT

NUEVOSTELEMAT

  • Universidad del Caribe
  • Con tecnología Koha