EVERYDAY FREE SHIPPING on $25 & up  Excludes Marketplace items
EVERYDAY FREE SHIPPING
on $25 & up
 Excludes Marketplace
Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities

Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities - 07 edition

ISBN13: 978-0321444424

Cover of Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities 07 (ISBN 978-0321444424)
ISBN13: 978-0321444424
ISBN10: 0321444426

Cover type: Paperback
Edition: 07
Copyright: 2007
Publisher: Addison-Wesley Longman, Inc.
Published: 2007
International: No

List price: $79.99

Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities - 07 edition

ISBN13: 978-0321444424

Mark Dowd, John McDonald and Justin Schuh

ISBN13: 978-0321444424
ISBN10: 0321444426

Cover type: Paperback
Edition: 07
Copyright: 2007
Publisher: Addison-Wesley Longman, Inc.
Published: 2007
International: No
Summary

The Definitive Insider's Guide to Auditing Software Security

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for ''ripping apart'' applications to reveal even the most subtle and well-hidden security flaws.

The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.

Coverage includes

  • Code auditing: theory, practice, proven methodologies, and secrets of the trade
  • Bridging the gap between secure software design and post-implementation review
  • Performing architectural assessment: design review, threat modeling, and operational review
  • Identifying vulnerabilities related to memory management, data types, and malformed data
  • UNIX/Linux assessment: privileges, files, and processes
  • Windows-specific issues, including objects and the filesystem
  • Auditing interprocess communication, synchronization, and state
  • Evaluating network software: IP stacks, firewalls, and common application protocols
  • Auditing Web applications and technologies

This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.

Digital Rights

eBook Requirements
VitalSource Bookshelf Reader
Minimum System Requirements:
  • Windows 7/8, or Mac OS X 10.6 or above
Software Requirements:

eTextbooks and eChapters can be viewed by using the free reader listed below.

Be sure to check the format of the eTextbook/eChapter you purchase to know which reader you will need. After purchasing your eTextbook or eChapter, you will be emailed instructions on where and how to download your free reader.

Download Requirements:

Due to the size of eTextbooks, a high-speed Internet connection (cable modem, DSL, LAN) is required for download stability and speed. Your connection can be wired or wireless.

Being online is not required for reading an eTextbook after successfully downloading it. You must only be connected to the Internet during the download process.

User Help:

Click Here to access the VitalSource Bookshelf FAQ

Digital Rights
VitalSource Bookshelf
Copying: Allowed, 2 selections may be copied every 365 days
Printing: Allowed, 2 prints for 365 days
Expires: Yes, may be used for 365 days after activation
Reading Aloud: Allowed
Sharing: Not Allowed
Min. Software Version: VitalSource Bookshelf
Suitable Devices: PCs, Tablet PCs, Macs, Laptops


Digital Rights Management (DRM) Key


Copying - Books that cannot be copied will show "Not Allowed." Otherwise, this will detail the number of times it can be copied, or "Allowed with no limits."

Printing - Books that cannot be printed will show "Not Allowed." Otherwise, this will detail the number of times it can be printed, or "Allowed with no limits."

Expires - Books that have no expiration (the date upon which you will no longer be able to access your eBook) will read "No Expiration." Otherwise it will state the number of days from activation (the first time you actually read it).

Reading Aloud - Books enabled with the "text-to-speech" feature so that they can be read aloud will show "Allowed."

Sharing - Books that cannot be shared with other computers will show "Not Allowed."

Min. Software Version - This is the minimum software version needed to read this book.

Suitable Devices - Hardware known to be compatible with this book. Note: Reader software still needs to be installed.

List price: $79.99
  • Marketplace
  • From