|
Movies Books Music Food Tv Shows Technology Politics Video Games Parenting Fashion Green Living more >

Lunch » Tags » Books » Reviews » Exploiting Software: How to Break Code

Exploiting Software: How to Break Code

3 Ratings: 5.0
A book by Greg Hoglund

Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, andExploiting Software: How to Break … see full wiki

Tags: Books
Author: Greg Hoglund
Genre: Computers & Internet
Publisher: Addison-Wesley Professional
4 reviews about Exploiting Software: How to Break Code
review by . June 07, 2004
To be useful, software must respond to events in a predictable manner. The results can then be used as a window to the interior workings of the code, revealing some of the mechanisms of operations, which may be used to find ways to make it fail in a dangerous way. To some, the window is as clear as a six inch thick pane of lead, but to those with a high level of understanding it can be clear, or at the very least serve as a keyhole. This is an allusion to the old detective stories where someone …
review by . March 06, 2004
Target Audience  Software developers and network administrators who are responsible for or concerned with the security of the code they write or run.Contents  This book covers software exploits and how they work. The book is divided into the following chapters:Software - The Root Of The Problem; Attack Patterns; Reverse Engineering And Program Understanding; Exploiting Server Software; Exploiting Client Software; Crafting (Malicious) Input; Buffer Overflow; Rootkits; References; …
review by . March 05, 2004
Many readers and reviewers view this book as a security text, which it is. However, the main value in my opinion is to the software testing/QA community and to developers working in environments using either agile methods or Extreme Programming.For the software testing and QA community the book is a ready-made manual for developing test cases, and also raises interesting thoughts about testing tools. For example, Chapter 8 (Rootkits) gives a list of techniques and tools that can be effectively used …
review by . March 05, 2004
Many readers and reviewers view this book as a security text, which it is. However, the main value in my opinion is to the software testing/QA community and to developers working in environments using either agile methods or Extreme Programming.For the software testing and QA community the book is a ready-made manual for developing test cases, and also raises interesting thoughts about testing tools. For example, Chapter 8 (Rootkits) gives a list of techniques and tools that can be effectively used …
What's your opinion on Exploiting Software: How to Break Code?
rate
3 Ratings: +5.0
You have exceeded the maximum length.
Photos
Exploiting Software: How to Break Code
Related Topics
A Clockwork Orange

A novel by Anthony Burgess

Gary Larson - The Complete Far Side: 1980-1994

A collection of Far Side comics

Photography

A book by Bruce Warren

© 2014 Lunch.com, LLC All Rights Reserved
Lunch.com - Relevant reviews by real people.
()
This is you!
Ranked #
Last login
Member since
reviews
comments
ratings
questions
compliments
lists