Free
The Art Of Software Security Assessment: Identifying And Preventing Software Vulnerabilities (2 Volume Set)
Ebooks Online

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.” –Halvar Flake, CEO and head of research, SABRE Security GmbH   Note: This is now a 2 volume set which is shrink wrapped.    The Definitive Insider’s Guide to Auditing Software Security   This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.   The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.   Coverage includes   • Code auditing: theory, practice, proven methodologies, and secrets of the trade • Bridging the gap between secure software design and post-implementation review • Performing architectural assessment: design review, threat modeling, and operational review • Identifying vulnerabilities related to memory management, data types, and malformed data • UNIX/Linux assessment: privileges, files, and processes • Windows-specific issues, including objects and the filesystem • Auditing interprocess communication, synchronization, and state • Evaluating network software: IP stacks, firewalls, and common application protocols • Auditing Web applications and technologies   This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.   Contents ABOUT THE AUTHORS     xv PREFACE     xvii ACKNOWLEDGMENTS    xxi I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS    3 2 DESIGN REVIEW     25 3 OPERATIONAL REVIEW    67 4 APPLICATION REVIEW PROCESS    91 II Software Vulnerabilities 5 MEMORY CORRUPTION    167 6 C LANGUAGE ISSUES     203 7 PROGRAM BUILDING BLOCKS     297 8 STRINGS ANDMETACHARACTERS    387 9 UNIX I: PRIVILEGES AND FILES     459 10 UNIX II: PROCESSES     559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM     625 12 WINDOWS II: INTERPROCESS COMMUNICATION     685 13 SYNCHRONIZATION AND STATE    755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS    829 15 FIREWALLS    891 16 NETWORK APPLICATION PROTOCOLS    921 17 WEB APPLICATIONS    1007 18 WEB TECHNOLOGIES     1083 BIBLIOGRAPHY     1125 INDEX     1129

Paperback: 1200 pages

Publisher: Addison-Wesley Professional; 1 edition (November 30, 2006)

Language: English

ISBN-10: 9780321444424

ISBN-13: 978-0321444424

ASIN: 0321444426

Product Dimensions: 9.1 x 2.5 x 7.3 inches

Shipping Weight: 4 pounds (View shipping rates and policies)

Average Customer Review: 4.7 out of 5 stars  See all reviews (27 customer reviews)

Best Sellers Rank: #90,690 in Books (See Top 100 in Books) #20 in Books > Computers & Technology > Certification > CompTIA #103 in Books > Textbooks > Computer Science > Networking #104 in Books > Textbooks > Computer Science > Software Design & Engineering

This should have been the third book in line to be reviewed, but as I leafed through it, once, twice, and a third time I started to realize this is one of those rare security books that has a chance to revolutionize the industry like Applied Cryptography, Snort 2.0, or Hacking Exposed. The longer you wait to read this book, the further you will fall behind. Nuff said?Every week that goes by we see an increasing understanding in the community about how important secure software is and that it takes the appropriate development process to create secure software. This book is hitting the marketplace at the perfect time, I hope the authors and publishing team have a runaway success, you deserve it. I also hope people will be encouraged by this book, secure software development is certainly possible, this book clearly shows that. It takes management support in terms of resources, training and good process, but it can certainly be done. At 1128 content pages, much of this material will be things that you have picked up in other places, such as other books or courses you have taken. Much of it will be things you once knew and forgot. But this is the most complete book on software security out there covering Windows, Unix, Network Protocols, Web and other Applications.What I particularly love is the how approachable the majority of the information is. Please do not get me wrong, if you have never written a line of code you are going to be lost during the code examples, the only signpost you get is the occasional bolded line, but you will still be able to clearly follow the discussion before the code example and right after the code example.Section 1 of the book is called an Introduction to Software Security Assessment.

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (2 Volume set) Social Security & Medicare Facts 2016: Social Security Coverage, Maximization Strategies for Social Security Benefits, Medicare/Medicaid, Social Security Taxes, Retirement & Disability, Ser Keeping Livestock Healthy: A Comprehensive Veterinary Guide to Preventing and Identifying Disease in Horses, Cattle, Swine, Goats & Sheep, 4th Edition Identifying Spiders: The New Compact Study Guide and Identifier (Identifying Guide Series) Identifying Coca-Cola Collectibles (Identifying Guide Series) Value-Range Analysis of C Programs: Towards Proving the Absence of Buffer Overflow Vulnerabilities Security Risk Assessment: Managing Physical and Operational Security Essentials of Assessing, Preventing, and Overcoming Reading Difficulties (Essentials of Psychological Assessment) Identifying Perinatal Depression and Anxiety: Evidence-based Practice in Screening, Psychosocial Assessment and Management Pocket Companion for Physical Examination and Health Assessment, 6e (Jarvis, Pocket Companion for Physical Examination and Health Assessment) Advanced Health Assessment of Women, Third Edition: Clinical Skills and Procedures (Advanced Health Assessment of Women: Clinical Skills and Pro) Rabbit Medicine and Surgery: Self-Assessment Color Review, Second Edition (Veterinary Self-Assessment Color Review Series) ParaPro Assessment Secrets Study Guide: ParaProfessional Test Review for the ParaPro Assessment Orthopedic Physical Assessment, 5e (Orthopedic Physical Assessment (Magee)) Control Self-Assessment: Reengineering Internal Control (Enterprise Governance, Control, Audit, Security, Risk Management and Business Continuity) Managing Water and Agroecosystems for Food Security (Comprehensive Assessment of Water Management in Agriculture Series) Occupational and Environmental Health: Recognizing and Preventing Disease and Injury (Levy, Occupational and Envionmental Health) Dynamic Networks and Cyber-Security: 1 (Security Science and Technology) The Healthiest Diet on the Planet: Why the Foods You Love-Pizza, Pancakes, Potatoes, Pasta, and More-Are the Solution to Preventing Disease and Looking and Feeling Your Best Occupational and Environmental Health: Recognizing and Preventing Disease and Injury