Search by title, author or ISBN

The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities

Cover Art for 0785342444421, The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities by Mark Dowd; Justin Schuh; John McDonald
Add an alert Add to a list

Add a alert

Enter prices below and click 'Add'. You will receive an alert when the book is available for less than the new or used price you specify.

Alert if:
Close

Add this book to a list

You can add this book to any one of your lists. Just select the list below, and click 'Add'.

Close
Region
EAN: 0785342444421
Publisher: Addison Wesley Professional
Published: 20 November, 2006

Please describe the issue

If you have noticed an incorrect price, image or just something you'd like to tell us, enter it below. Please include your email address if you'd like a reply.

The Art of Software Security Assessment : Identifying and Preventing Software Vulnerabilities

There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude." - Halvar Flake, CEO and head of research, SABRE Security GmbH Note: This is now a 2 volume set which is shrink wrapped. The Definitive Insider's Guide to Auditing Software Security This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws. The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications . Coverage includes - Code auditing: theory, practice, proven methodologies, and secrets of the trade - Bridging the gap between secure software design and post-implementation review - Performing architectural assessment: design review, thre

NEW ITEMS
Prices in $AUD. Prices updated .
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...
USED ITEMS
Prices in $AUD
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...

Filters

Booko is reader-supported. When you buy through links on our site, we may earn an affiliate commission. Learn more

Historical Prices

Loading...
This graph is for informational purposes only. Occasionally pricing data is captured incorrectly, through bugs in Booko or the stores supplying data, which may distort the graph, providing undue hope that even lower prices sometimes appear.

Recently Updated