How does software break? How do attackers make software break on purpose? Why are
firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?
What tools can be used to break software? This book provides the answers.
Exploiting Software is loaded with examples of real attacks, attack patterns, tools, and
techniques used by bad guys to break software. If you want to protect your software from
attack, you must first learn how real attacks are really carried out.
This must-have book may shock you—and it will certainly educate you.Getting beyond the
script kiddie treatment found in many hacking books, you will learn about
Exploiting Software is filled with the tools, concepts, and knowledge necessary to break
- Why software exploit will continue to be a serious problem
- When network security mechanisms do not work
- Attack patterns
- Reverse engineering
- Classic attacks against server software
- Surprising attacks against client software
- Techniques for crafting malicious input
- The technical details of buffer overflows
Microsoft Encyclopedia of Security
Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...
Pro SQL Azure (Expert's Voice in .NET)
SQL Azure represents Microsoft’s cloud-based delivery of its enterprise-caliber, SQL Server database management system (formerly under the code name "Oslo"). Pro SQL Azure introduces you to this new platform, showing you how to program and administer it in a variety of cloud computing scenarios. You’ll learn to...
Verification of Business Rules Programs
Rules represent a simplified means of programming, congruent with our understanding of human brain constructs. With the advent of business rules management systems, it has been possible to introduce rule-based programming to nonprogrammers, allowing them to map expert intent into code in applications such as fraud detection, financial...
Manage Software Testing …a comprehensive, practical cookbook of software testing with a slight mix of quality spices. …the book is a step-by-step guide of how to perform testing. It is practically focused and, in many of the chapters, the reader can follow the tasks (as if they were recipes) when performing testing activities.
Circuit Design with VHDL This textbook teaches VHDL using system examples combined with programmable logic and supported by laboratory exercises. While other textbooks concentrate only on language features, Circuit Design with VHDL offers a fully integrated presentation of VHDL and design concepts by including a large number of complete design examples,... Encyclopedia of Prophecy Worldwide in scope and dating from biblical times, though its thrust is by no means exclusively religious, this encyclopedia ranges widely in its A-to-Z listing of entries. Among them are "apocalypse," "Edgar Cayce," "end of the world," "Napoleon," "premonitions," "sphinx," and...