Login       My Wishlist
  My Cart
$0.00 / 0 items
 
Translate This Website
International Translation Network
International Access
Global Shipping Options Available
Home   Our Catalog   Computers & Technology   Certification   CompTIA

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (2 Volume set)


Mega Sale! Save 23% on the The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (2 Volume set) by Addison-Wesley Professional at Translate This Website. MPN: 20935903. Hurry! Limited time offer. Offer valid only while supplies last. “There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.” –Halvar Flake, CEO and head of research, SABRE Security GmbH   Note: This is now a 2 volume set which is shrink wrapped.    The Definitive Insider’s Guide to Auditing Software Security   This is one of the most detailed, sophisticated, and useful guides to software security auditing ever


Product Description & Reviews

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.” –Halvar Flake, CEO and head of research, SABRE Security GmbH   Note: This is now a 2 volume set which is shrink wrapped.    The Definitive Insider’s Guide to Auditing Software Security   This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.   The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.   Coverage includes   • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies   This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.   Contents ABOUT THE AUTHORS     xv PREFACE     xvii ACKNOWLEDGMENTS    xxi I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS    3 2 DESIGN REVIEW     25 3 OPERATIONAL REVIEW    67 4 APPLICATION REVIEW PROCESS    91 II Software Vulnerabilities 5 MEMORY CORRUPTION    167 6 C LANGUAGE ISSUES     203 7 PROGRAM BUILDING BLOCKS     297 8 STRINGS ANDMETACHARACTERS    387 9 UNIX I: PRIVILEGES AND FILES     459 10 UNIX II: PROCESSES     559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM     625 12 WINDOWS II: INTERPROCESS COMMUNICATION     685 13 SYNCHRONIZATION AND STATE    755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS    829 15 FIREWALLS    891 16 NETWORK APPLICATION PROTOCOLS    921 17 WEB APPLICATIONS    1007 18 WEB TECHNOLOGIES     1083 BIBLIOGRAPHY     1125 INDEX     1129

Features & Highlights

Additional Information

Manufacturer:Addison-Wesley Professional
Part Number:20935903
Publisher:Addison-Wesley Professional
Studio:Addison-Wesley Professional
MPN:20935903
UPC:785342444421
EAN:9780321444424
Item Weight:4.04 pounds
Item Size:1.7 x 9.2 x 9.2 inches
Package Weight:4.05 pounds
Package Size:7 x 2.5 x 2.5 inches

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (2 Volume set) by Addison-Wesley Professional

Buy Now:
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (2 Volume set)

Brand: Addison-Wesley Professional
4.2 out of 5 stars with 17 reviews
Condition: New
Lead Time: 1 - 2 Business Days
Availability: In Stock
$79.99
$62.12
You Save: 22%


Quantity:  

 


View More In CompTIA.

 


Have questions about this item, or would like to inquire about a custom or bulk order?


If you have any questions about this product by Addison-Wesley Professional, contact us by completing and submitting the form below. If you are looking for a specif part number, please include it with your message.

First Name:
Last Name:
Email Address:
Your Message:

Scroll to Top


Privacy Policy / Terms of Service / Accessibility Statement
© 2019 - translateth.is. All Rights Reserved.