Do It Yourself!
Do It Yourself!
Welcome to the land of How-To's and D.I.Y!

Exploiting Software: How to Break Code

3 Ratings: 5.0
A book by Greg Hoglund

Computing hardware would have no value without software; software tells hardware what to do. Software therefore must have special authority within computing systems. All computer security problems stem from that fact, andExploiting Software: How to Break … see full wiki

Tags: Books
Author: Greg Hoglund
Genre: Computers & Internet
Publisher: Addison-Wesley Professional
3 reviews about Exploiting Software: How to Break Code
review by . June 07, 2004
To be useful, software must respond to events in a predictable manner. The results can then be used as a window to the interior workings of the code, revealing some of the mechanisms of operations, which may be used to find ways to make it fail in a dangerous way. To some, the window is as clear as a six inch thick pane of lead, but to those with a high level of understanding it can be clear, or at the very least serve as a keyhole. This is an allusion to the old detective stories where someone …
review by . March 05, 2004
Many readers and reviewers view this book as a security text, which it is. However, the main value in my opinion is to the software testing/QA community and to developers working in environments using either agile methods or Extreme Programming.For the software testing and QA community the book is a ready-made manual for developing test cases, and also raises interesting thoughts about testing tools. For example, Chapter 8 (Rootkits) gives a list of techniques and tools that can be effectively used …
review by . March 05, 2004
Many readers and reviewers view this book as a security text, which it is. However, the main value in my opinion is to the software testing/QA community and to developers working in environments using either agile methods or Extreme Programming.For the software testing and QA community the book is a ready-made manual for developing test cases, and also raises interesting thoughts about testing tools. For example, Chapter 8 (Rootkits) gives a list of techniques and tools that can be effectively used …
What's your opinion on Exploiting Software: How to Break Code?
rate
3 Ratings: +5.0
You have exceeded the maximum length.
Photos
Exploiting Software: How to Break Code
© 2014 Lunch.com, LLC All Rights Reserved
Lunch.com - Relevant reviews by real people.
Do It Yourself! is part of the Lunch.com Network - Get this on your site
()
This is you!
Ranked #
Last login
Member since
reviews
comments
ratings
questions
compliments
lists