How to Break Web Software: Functional and Security Testing of Web Applications and Web Services 1st Edition, Kindle Edition

4.1 out of 5 stars 18 customer reviews
ISBN-13: 978-0321369444
ISBN-10: 0321369440
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Kindle App Ad
Buy
$25.99
Digital List Price: $43.99 Save $18.00 (41%)‎

Deliver to your Kindle or other device

Price
New from Used from
Kindle
"Please retry"
$25.99

Dropbox Plus
With 1 TB of space and unrivaled sync, Dropbox Plus gives you plenty of room to keep everything safe and in one place. > Learn more
click to open popover

Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.


Editorial Reviews

From the Back Cover

"The techniques in this book are not an option for testers–they are mandatory and these are the guys to tell you how to apply them!"
–HarryRobinson, Google.

 

Rigorously test and improve the security of all your Web software!

 

It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software.

 

In this book, two renowned experts address every category of Web software exploit: attacks on clients, servers, state, user inputs, and more. You’ll master powerful attack tools and techniques as you uncover dozens of crucial, widely exploited flaws in Web architecture and coding. The authors reveal where to look for potential threats and attack vectors, how to rigorously test for each of them, and how to mitigate the problems you find. Coverage includes

 

·   Client vulnerabilities, including attacks on client-side validation

·   State-based attacks: hidden fields, CGI parameters, cookie poisoning, URL jumping, and session hijacking

·   Attacks on user-supplied inputs: cross-site scripting, SQL injection, and directory traversal

·   Language- and technology-based attacks: buffer overflows, canonicalization, and NULL string attacks

·   Server attacks: SQL Injection with stored procedures, command injection, and server fingerprinting

·   Cryptography, privacy, and attacks on Web services

 

Your Web software is mission-critical–it can’t be compromised. Whether you’re a developer, tester, QA specialist, or IT manager, this book will help you protect that software–systematically.

 

Companion CD contains full source code for one testing tool you can modify and extend, free Web security testing tools, and complete code from a flawed Web site designed to give you hands-on practice in identifying security holes.

About the Author

Mike Andrews is a senior consultant at Foundstone who specializes in software security and leads the Web application security assessments and Ultimate Web Hacking classes. He brings with him a wealth of commercial and educational experience from both sides of the Atlantic and is a widely published author and speaker. Before joining Foundstone, Mike was a freelance consultant and developer of Web-based information systems, working with clients such as The Economist, the London transport authority, and various United Kingdom universities. In 2002, after being an instructor and researcher for a number of years, Mike joined the Florida Institute of Technology as an assistant professor, where he was responsible for research projects and independent security reviews for the Office of Naval Research, Air Force Research Labs, and Microsoft Corporation. Mike holds a Ph.D. in computer science from the University of Kent at Canterbury in the United Kingdom, where his focus was on debugging tools and programmer psychology.

 

James A. Whittaker is a professor of computer science at the Florida Institute of Technology (Florida Tech) and is founder of Security Innovation. In 1992, he earned his Ph.D. in computer science from the University of Tennessee. His research interests are software testing, software security, software vulnerability testing, and anticyber warfare technology. James is the author of How to Break Software (Addison-Wesley, 2002) and coauthor (with Hugh Thompson) of How to Break Software Security (Addison-Wesley, 2003), and over fifty peer-reviewed papers on software development and computer security. He holds patents on various inventions in software testing and defensive security applications and has attracted millions in funding, sponsorship, and license agreements while a professor at Florida Tech. He has also served as a testing and security consultant for Microsoft, IBM, Rational, and many other United States companies.

 

In 2001, James was appointed to Microsoft’s Trustworthy Computing Academic Advisory Board and was named a “Top Scholar” by the editors of the Journal of Systems and Software, based on his research publications in software engineering. His research team at Florida Tech is known for its testing technologies and tools, which include the highly acclaimed runtime fault injection tool Holodeck. His research group is also well known for their development of exploits against software security, including cracking encryption, passwords and infiltrating protected networks via novel attacks against software defenses.

 


Product details

  • File Size: 5906 KB
  • Print Length: 240 pages
  • Simultaneous Device Usage: Up to 5 simultaneous devices, per publisher limits
  • Publisher: Addison-Wesley Professional; 1 edition (February 2, 2006)
  • Publication Date: February 2, 2006
  • Sold by: Amazon Digital Services LLC
  • Language: English
  • ASIN: B0028MBKCA
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Lending: Not Enabled
  • Screen Reader: Supported
  • Enhanced Typesetting: Enabled
  • Amazon Best Sellers Rank: #1,086,176 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  • Would you like to tell us about a lower price?


Customer reviews

Top customer reviews

on May 19, 2006
Format: Paperback|Verified Purchase
0Comment| 11 people found this helpful. Was this review helpful to you?YesNoReport abuse
on July 4, 2015
Format: Kindle Edition|Verified Purchase
0Comment|Was this review helpful to you?YesNoReport abuse
on August 26, 2013
Format: Paperback|Verified Purchase
0Comment|Was this review helpful to you?YesNoReport abuse
on March 7, 2011
Format: Paperback|Verified Purchase
0Comment| One person found this helpful. Was this review helpful to you?YesNoReport abuse
on April 12, 2007
Format: Paperback|Verified Purchase
0Comment| 2 people found this helpful. Was this review helpful to you?YesNoReport abuse
on June 29, 2007
Format: Paperback
0Comment| 3 people found this helpful. Was this review helpful to you?YesNoReport abuse
Format: Paperback
0Comment| 12 people found this helpful. Was this review helpful to you?YesNoReport abuse

Most recent customer reviews

Set up an Amazon Giveaway

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services
Amazon Giveaway allows you to run promotional giveaways in order to create buzz, reward your audience, and attract new followers and customers. Learn more about Amazon Giveaway
This item: How to Break Web Software: Functional and Security Testing of Web Applications and Web Services