Open source fuzzing tools:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam
Elsevier
2007
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it! Open Source Fuzzing Tools is the first book to market that covers the subject of black box testing using fuzzing techniques. Fuzzing has been around fow a while, but is making a transition from hacker home-grown tool to commercial-grade quality assurance product. Using fuzzing, developers can find and eliminate buffer overflows and other software vulnerabilities during the development process and before release. * Fuzzing is a fast-growing field with increasing commercial interest (7 vendors unveiled fuzzing products last year). * Vendors today are looking for solutions to the ever increasing threat of vulnerabilities. Fuzzing looks for these vulnerabilities automatically, before they are known, and eliminates them before release. * Software developers face an incresing demand to produce secure applications---and they are looking for any information to help them do that |
Beschreibung: | 1 Online-Ressource (1 online resource) |
ISBN: | 9781597491952 1597491950 9780080555614 0080555616 1281145157 9781281145154 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042314191 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2007 |||| o||u| ||||||eng d | ||
020 | |a 9781597491952 |9 978-1-59749-195-2 | ||
020 | |a 1597491950 |9 1-59749-195-0 | ||
020 | |a 9780080555614 |c electronic bk. |9 978-0-08-055561-4 | ||
020 | |a 0080555616 |c electronic bk. |9 0-08-055561-6 | ||
020 | |a 1281145157 |9 1-281-14515-7 | ||
020 | |a 9781281145154 |9 978-1-281-14515-4 | ||
035 | |a (ZDB-33-EBS)ocn162131608 | ||
035 | |a (OCoLC)162131608 | ||
035 | |a (DE-599)BVBBV042314191 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Rathaus, Noam |e Verfasser |4 aut | |
245 | 1 | 0 | |a Open source fuzzing tools |
264 | 1 | |a Amsterdam |b Elsevier |c 2007 | |
300 | |a 1 Online-Ressource (1 online resource) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it! Open Source Fuzzing Tools is the first book to market that covers the subject of black box testing using fuzzing techniques. Fuzzing has been around fow a while, but is making a transition from hacker home-grown tool to commercial-grade quality assurance product. Using fuzzing, developers can find and eliminate buffer overflows and other software vulnerabilities during the development process and before release. * Fuzzing is a fast-growing field with increasing commercial interest (7 vendors unveiled fuzzing products last year). * Vendors today are looking for solutions to the ever increasing threat of vulnerabilities. Fuzzing looks for these vulnerabilities automatically, before they are known, and eliminates them before release. * Software developers face an incresing demand to produce secure applications---and they are looking for any information to help them do that | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 4 | |a Computer security | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597491952 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027751182 |
Datensatz im Suchindex
_version_ | 1804152907081187328 |
---|---|
any_adam_object | |
author | Rathaus, Noam |
author_facet | Rathaus, Noam |
author_role | aut |
author_sort | Rathaus, Noam |
author_variant | n r nr |
building | Verbundindex |
bvnumber | BV042314191 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-EBS)ocn162131608 (OCoLC)162131608 (DE-599)BVBBV042314191 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02682nmm a2200457zc 4500</leader><controlfield tag="001">BV042314191</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2007 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597491952</subfield><subfield code="9">978-1-59749-195-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597491950</subfield><subfield code="9">1-59749-195-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080555614</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-08-055561-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080555616</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-08-055561-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281145157</subfield><subfield code="9">1-281-14515-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281145154</subfield><subfield code="9">978-1-281-14515-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-EBS)ocn162131608</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)162131608</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042314191</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rathaus, Noam</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Open source fuzzing tools</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it! Open Source Fuzzing Tools is the first book to market that covers the subject of black box testing using fuzzing techniques. Fuzzing has been around fow a while, but is making a transition from hacker home-grown tool to commercial-grade quality assurance product. Using fuzzing, developers can find and eliminate buffer overflows and other software vulnerabilities during the development process and before release. * Fuzzing is a fast-growing field with increasing commercial interest (7 vendors unveiled fuzzing products last year). * Vendors today are looking for solutions to the ever increasing threat of vulnerabilities. Fuzzing looks for these vulnerabilities automatically, before they are known, and eliminates them before release. * Software developers face an incresing demand to produce secure applications---and they are looking for any information to help them do that</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597491952</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027751182</subfield></datafield></record></collection> |
id | DE-604.BV042314191 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:18:10Z |
institution | BVB |
isbn | 9781597491952 1597491950 9780080555614 0080555616 1281145157 9781281145154 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027751182 |
oclc_num | 162131608 |
open_access_boolean | |
owner | DE-1046 |
owner_facet | DE-1046 |
physical | 1 Online-Ressource (1 online resource) |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Elsevier |
record_format | marc |
spelling | Rathaus, Noam Verfasser aut Open source fuzzing tools Amsterdam Elsevier 2007 1 Online-Ressource (1 online resource) txt rdacontent c rdamedia cr rdacarrier A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it! Open Source Fuzzing Tools is the first book to market that covers the subject of black box testing using fuzzing techniques. Fuzzing has been around fow a while, but is making a transition from hacker home-grown tool to commercial-grade quality assurance product. Using fuzzing, developers can find and eliminate buffer overflows and other software vulnerabilities during the development process and before release. * Fuzzing is a fast-growing field with increasing commercial interest (7 vendors unveiled fuzzing products last year). * Vendors today are looking for solutions to the ever increasing threat of vulnerabilities. Fuzzing looks for these vulnerabilities automatically, before they are known, and eliminates them before release. * Software developers face an incresing demand to produce secure applications---and they are looking for any information to help them do that COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security http://www.sciencedirect.com/science/book/9781597491952 Verlag Volltext |
spellingShingle | Rathaus, Noam Open source fuzzing tools COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security |
title | Open source fuzzing tools |
title_auth | Open source fuzzing tools |
title_exact_search | Open source fuzzing tools |
title_full | Open source fuzzing tools |
title_fullStr | Open source fuzzing tools |
title_full_unstemmed | Open source fuzzing tools |
title_short | Open source fuzzing tools |
title_sort | open source fuzzing tools |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer security fast Computer security |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer security |
url | http://www.sciencedirect.com/science/book/9781597491952 |
work_keys_str_mv | AT rathausnoam opensourcefuzzingtools |