Industrial-Sized Deals Shop all Back to School Shop Women's Handbags Learn more nav_sap_SWP_6M_fly_beacon $5 Albums $5 Off Fire TV Stick Subscribe & Save Shop Popular Services TransparentGGWin TransparentGGWin TransparentGGWin  Amazon Echo Starting at $99 Kindle Voyage Gear Up for Football Learn more
Fuzzing for Software Security Testing and Quality Assurance and over one million other books are available for Amazon Kindle. Learn more
Buy New
$64.38
Qty:1
  • List Price: $89.00
  • Save: $24.62 (28%)
Usually ships within 1 to 4 weeks.
Ships from and sold by Amazon.com.
Gift-wrap available.
Fuzzing for Software Secu... has been added to your Cart
Sell yours for a Gift Card
We'll buy it for $3.00
Learn More
Trade in now
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy) Hardcover – June 30, 2008

3 customer reviews

See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Kindle
"Please retry"
Hardcover
"Please retry"
$64.38
$61.00 $57.81
$64.38 FREE Shipping. Usually ships within 1 to 4 weeks. Ships from and sold by Amazon.com. Gift-wrap available.

Frequently Bought Together

Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy) + Fuzzing: Brute Force Vulnerability Discovery
Price for both: $105.26

One of these items ships sooner than the other.

Buy the selected items together

Editorial Reviews

About the Author

Ari Takanen is the chief technical officer at Codenomicon, a software fuzzing tool company. A noted speaker and author on software testing and security, he is a graduate of Finland's University of Oulo, where he did research with the university's Secure Programming Group. Jared D. DeMott is a software vulnerability researcher, speaker, teacher, and author. He is a leading expert on fuzzing and fuzzing tools. He earned an M.S. in computer science from Johns Hopkins University and is a Ph.D. candidate at Michigan State University. Charlie Miller is principal analyst at Independent Security Evaluators. Previously, he spent five years at the National Security Agency. He is probably best known as the first to publicly create a remote exploit against the iPhone. Dr. Miller is also a frequent speaker at major computer security conferences. He earned his Ph.D. from the University of Notre Dame.

NO_CONTENT_IN_FEATURE

China
Engineering & Transportation Books
Discover books for all types of engineers, auto enthusiasts, and much more. Learn more

Product Details

  • Series: Artech House Information Security and Privacy
  • Hardcover: 287 pages
  • Publisher: Artech House Print on Demand; 1 edition (June 30, 2008)
  • Language: English
  • ISBN-10: 1596932147
  • ISBN-13: 978-1596932142
  • Product Dimensions: 7 x 0.8 x 10 inches
  • Shipping Weight: 1.6 pounds (View shipping rates and policies)
  • Average Customer Review: 2.7 out of 5 stars  See all reviews (3 customer reviews)
  • Amazon Best Sellers Rank: #208,874 in Books (See Top 100 in Books)

More About the Authors

Discover books, learn about writers, read author blogs, and more.

Customer Reviews

Most Helpful Customer Reviews

7 of 9 people found the following review helpful By User 1138 on June 16, 2009
Format: Hardcover
The introduction to this book mentions its broken up history, being picked up and abandoned a couple times. It definitely shows in the writing, which is unfocused, choppy, and repetitive. Most of the first half is taken up with repetitive descriptions of the general software testing process. The second half contains a summary of one author's thesis on using evolutionary algorithms for fuzzing and the final author's use of various fuzzing tools to try to find hand-inserted vulnerabilities. While the latter half is better than the first, each topic is worthy of a single blog post. Given this book's price and the authors' reputations, I expected more.

At the same time, I read "Gray Hat Python" and it was enjoyable. Even though it had a much broader focus on other topics, it contained more hands-on info on fuzzing tools. I'm also interested in "Fuzzing: Brute Force Vulnerability Discovery", although I have not read it yet.

Don't waste your time on this book. Download the Sulley manual, read the slides from a few Blackhat talks, and you'll be at the state of the art for current fuzzing knowledge.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 5 people found the following review helpful By Robert on August 7, 2008
Format: Hardcover Verified Purchase
Fuzzing generally involves testing the parameters of an application using random or specifically formatted randomized input to evaluate whether a given application crashes and/ or can be exploited. At least two of the authors have worked at the National Security Agency. Dr. Charlie Miller is well known for publishing an interesting article on the economics of the black market trading of security vulnerabilities (avaliable at weis2007.econinfosec.org/papers/29.pdf). Dr. Miller demonstrated the utility of the procedures discussed in this book at BlackHat 2008. This book provides insight into an area of research that is not usually publicly avaliable. The book details a number of open-source and commercially avaliable fuzzers and their relative reliability in finding bugs. Fuzzers are one of the most reliable methods for finding vulnerabilities in closed source programs. The book is conceptually accessible to an individual with some knowledge of secure programming and vulnerabilities.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Hardcover Verified Purchase
This is more of an academic read rather than a practical approach to learned how fuzzing and writing fuzzers works.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Want to discover more products? Check out this page to see more: network testing software