Exploiting Software: How to Break Code

Course

Distance

£ 37 + VAT

Description

  • Type

    Course

  • Methodology

    Distance Learning

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Description
How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.

Program

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and techniques used by bad guys to break software. If you want to protect your software from attack, you must first learn how real attacks are really carried out.



This must-have book may shock you - and it will certainly educate you . You will learn about:
  • Why software exploitation will continue to be a serious problem
  • When network security mechanisms do not work
  • Attack patterns
  • Reverse engineering
  • Classic attacks against server software
  • Surprising attacks against client software
  • Techniques for crafting malicious input
  • The technical details of buffer overflows
  • Rootkits
This information needs to be understood and digested by security professionals so that they know the magnitude of the problem and they can begin to address it properly. Today, all developers should be security-minded. The knowledge in this book will arm you with a real understanding of the software security problem.



Reviews of this Book:

'It's about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play.'
- Bruce Schneier, Chief Technology Officer, Counterpane, Author of Beyond Fear and Secrets and Lies

'This book describes the threats to software in concrete, understandable, and frightening detail. It also discusses how to find these problems before the bad folks do. A valuable addition to every programmer's and security person's library!'
- Matt Bishop, Ph.D. Professor of Computer Science, University of California at Davis, Author of Computer Security: Art and Science


'This is a seductive book. It starts with a simple story, telling about hacks and cracks. It draws you in with anecdotes, but builds from there. In a few chapters you find yourself deep in the intimate details of software security. It is the rare technical book that is a readable and enjoyable primer but has the substance to remain on your shelf as a reference. Wonderful stuff.'
- Craig Miller, Ph.D. Chief Technology Officer for North America Dimension Data

Authors: Greg Hoglund, Gary McGraw
Publisher: Addison Wesley Professional
ISBN 10: 0201786958
ISBN 13: 9780201786958
Pages: 512
Format: Soft Cover
Published Date: Mar 2004
Availability: Ex Stock

Ensure that you have a a thorough understanding of the ways software is vunerable to attack by purchasing this essential book today.


Exploiting Software: How to Break Code

£ 37 + VAT