- Series: Charles River Media Programming
- Paperback: 354 pages
- Publisher: Charles River Media; 1 edition (June 3, 2005)
- Language: English
- ISBN-10: 1584503580
- ISBN-13: 978-1584503583
- Product Dimensions: 9.3 x 7.4 x 1 inches
- Shipping Weight: 1.7 pounds
- Average Customer Review: 5.0 out of 5 stars See all reviews (6 customer reviews)
- Amazon Best Sellers Rank: #3,076,378 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
The Software Vulnerability Guide (Programming Series) (Charles River Media Programming) 1st Edition
Use the Amazon App to scan ISBNs and compare prices.
Top 20 lists in Books
View the top 20 best sellers of all time, the most reviewed books of all time and some of our editors' favorite picks. Learn more
Customers who viewed this item also viewed
About the Author
Herbert Thomas is the Director of Security Technology at Security Innovation LLC and serves on the graduate faculty of the Florida Institute of Technology. He is the co-author of How to Break Sofware Security: Effective Techniques for Security Testing and is a frequent speaker at industry conferences. Scott Chase is a Security Architect at SI Government Solutions, where he manages key research projects for the US government. He has also worked as a university researcher in information security and as a software tester in industry.
Browse award-winning titles. See more
If you are a seller for this product, would you like to suggest updates through seller support?
Top customer reviews
The Software Vulnerability Guide was written to help software developers acquire the methods necessary to write secure code and find existing problems in current software. After making a persuasive case for secure code in part one, the book progresses into the areas that are crucial to writing secure software.
Part two of the book covers system-level attacks and details important topics such as passwords, scripts and macros, and dynamic linking and loading (DLL). Part three plunges into attacks on the software, exploring heady concepts such as buffer overflows, format-string vulnerabilities, and integer overflow vulnerabilities. Most of these attacks have been known for decades but are only receiving wide-scale attention now.
Further chapters delve into securing data and Web servers. For each of the vulnerabilities mentioned, the authors describe how they occur and how to prevent them.
An enclosed CD-ROM contains software examples described in the text, plus various open-source security software testing tools, including Ethereal, Nessus, and Nmap. Any business serious about writing secure software should ensure that all of its code writers receive a copy of this book
Unlike a lot of other security books, this one isn't full of a bunch of vagure generalities. It gives you solid details on some of the most common (and perhaps some less common) holes that exist in the software you just released. The information contained in each useful chapter is easily digestable by beginners.
Buy the book and spare yourself the embarrassment from some twenty something who stole some script off the web and deleted all the data in your intranet application.
References and follow-up/conclusion were useful.