Exploiting Software: How to Break Code



Greg Hoglund, Gary McGraw, "Exploiting Software: How to Break Code"
Addison-Wesley Professional | 2004 | ISBN: 0201786958 | 512 pages | File type: PDF | 5,1 mb
Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, and Exploiting Software: How to Break Code shows you how to design your software so it's as resistant as possible to attack. Sure, everything's phrased in offensive terms (as instructions for the attacker, that is), but this book has at least as much value in showing designers what sorts of attacks their software will face (the book could serve as a checklist for part of a pre-release testing regimen). Plus, the clever reverse-engineering strategies that Greg Hoglund and Gary McGraw teach will be useful in many legitimate software projects. Consider this a recipe book for mayhem, or a compendium of lessons learned by others. It depends on your situation.

PHP programmers will take issue with the authors' blanket assessment of their language ("PHP is a study in bad security"), much of which seems based on older versions of the language that had some risky default behaviorsbut those programmers will also double-check their servers' register_globals settings. Users of insufficiently patched Microsoft and Oracle products will worry about the detailed attack instructions this book contains. Responsible programmers and administrators will appreciate what amounts to documentation of attackers' rootkits for various operating systems, and will raise their eyebrows at the techniques for writing malicious code to unused EEPROM chips in target systems. David Wall

Topics covered: How to make software fail, either by doing something it wasn't designed to do, or by denying its use to its rightful users. Techniquesincluding reverse engineering, buffer overflow, and particularly provision of unexpected inputare covered along with the tools needed to carry them out. A section on hardware viruses is detailed and frightening.
Review

Download:

http://uploading.com/files/f1f6mf92/0201786958Software.rar/



http://www.megaupload.com/?d=DI1IM640


[Fast Download] Exploiting Software: How to Break Code


Related eBooks:
A Guide To Cyber Security
Human-Computer Interaction and Cybersecurity Handbook (Human Factors and Ergonomics)
Essential CISSP Exam Guide: Updated for the 2018 CISSP Body of Knowledge
From CIA to APT: An Introduction to Cyber Security
Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information
Communications and Multimedia Security. Advanced Techniques for Network and Data Protection
Biometric Security
American National Security and Civil Liberties in an Era of Terrorism
NATO Cyberspace Capability
The Modern Bodyguard: The Complete Manual of Close Protection Training
Cyber Security: for You
Eric Seagren - Secure Your Network for Free
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.