ISBN - 0201786958

TitelExploiting Software - How to break Code
Greg Hoglund & Gary McGraw - Exploiting Software - How to break Code: Vorn
Greg Hoglund & Gary McGraw
Exploiting Software - How to break Code
Vorn:
Greg Hoglund & Gary McGraw - Exploiting Software - How to break Code: Hinten
Greg Hoglund & Gary McGraw
Exploiting Software - How to break Code
Hinten:
AutorenGreg Hoglund & Gary McGraw
Spracheenglisch
BuchtypSachbuch
Auflage1
Jahr2004
BuchformatTaschenbuch
GenreSachbuch
Seiten471
Preis49.99 US-Dollar, 71.99 Kanadische Dollar
Gewicht990g
ISBN0-201-78695-8, ISBN13: 978-0-201-78695-8
VerlagAddison-Wesley
Klappentext How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.

Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks may shock you - and it will certainly educate you.

Getting beyond the script kiddie treatment found in many hacking books, you will learn * Why software exploit will continue to be a serious problem * When network security mechanisms do not work * Attack patterns * Reverse engineering * Classic attacks against server software * Surprising attacks against client software * Techniques for crafting malicious input * The technical details of buffer overflows * Rootkits

Exploiting software is filled with the tools, concepts, and knowledge necessary to break software.

Greg Hoglund has been a pioneer in the area of software security for ten years. He created and documented the first Windows NT-based rootkit, founding www.rootkit.com in the process.

Gary McGraw, Ph.D., is CTO of Cigital, and is a world authority on software and application security. Dr. McGraw coauthored Java Security (Wiley, 1996) and Building Secure Software (Addison-Wesley, 2002). He consults with major corporations, performs scientific research in software security, and advises security startups.