Fuzzing for software security testing and quality assurance:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston
Artech House
©2008
|
Schriftenreihe: | Artech House information security and privacy series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references and index Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools |
Beschreibung: | 1 Online-Ressource (xxii, 287 pages) |
ISBN: | 1596932147 1596932155 9781596932142 9781596932159 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043124484 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 1596932147 |9 1-59693-214-7 | ||
020 | |a 1596932155 |c electronic bk. |9 1-59693-215-5 | ||
020 | |a 9781596932142 |9 978-1-59693-214-2 | ||
020 | |a 9781596932159 |9 978-1-59693-215-9 | ||
020 | |a 9781596932159 |c electronic bk. |9 978-1-59693-215-9 | ||
035 | |a (OCoLC)568023386 | ||
035 | |a (DE-599)BVBBV043124484 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Takanen, Ari |e Verfasser |4 aut | |
245 | 1 | 0 | |a Fuzzing for software security testing and quality assurance |c Ari Takanen, Jared DeMott, Charlie Miller |
264 | 1 | |a Boston |b Artech House |c ©2008 | |
300 | |a 1 Online-Ressource (xxii, 287 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Artech House information security and privacy series | |
500 | |a Includes bibliographical references and index | ||
500 | |a Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies | ||
500 | |a This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools | ||
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
650 | 4 | |a Logiciels / Qualité / Contrôle | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software / Development |2 fast | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer software |x Development | |
650 | 0 | 7 | |a Testen |0 (DE-588)4367264-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareentwicklung |0 (DE-588)4116522-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Qualitätsmanagement |0 (DE-588)4219057-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Softwareentwicklung |0 (DE-588)4116522-6 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Qualitätsmanagement |0 (DE-588)4219057-5 |D s |
689 | 0 | 3 | |a Testen |0 (DE-588)4367264-4 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Demott, Jared D. |e Sonstige |4 oth | |
700 | 1 | |a Miller, Charles |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028548674 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175557194153984 |
---|---|
any_adam_object | |
author | Takanen, Ari |
author_facet | Takanen, Ari |
author_role | aut |
author_sort | Takanen, Ari |
author_variant | a t at |
building | Verbundindex |
bvnumber | BV043124484 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)568023386 (DE-599)BVBBV043124484 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03593nmm a2200697zc 4500</leader><controlfield tag="001">BV043124484</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932147</subfield><subfield code="9">1-59693-214-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932155</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59693-215-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932142</subfield><subfield code="9">978-1-59693-214-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932159</subfield><subfield code="9">978-1-59693-215-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932159</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59693-215-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)568023386</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043124484</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Takanen, Ari</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fuzzing for software security testing and quality assurance</subfield><subfield code="c">Ari Takanen, Jared DeMott, Charlie Miller</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Artech House</subfield><subfield code="c">©2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxii, 287 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logiciels / Qualité / Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software / Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Testen</subfield><subfield code="0">(DE-588)4367264-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Qualitätsmanagement</subfield><subfield code="0">(DE-588)4219057-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Softwareentwicklung</subfield><subfield code="0">(DE-588)4116522-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Qualitätsmanagement</subfield><subfield code="0">(DE-588)4219057-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Testen</subfield><subfield code="0">(DE-588)4367264-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Demott, Jared D.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Charles</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028548674</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043124484 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:11Z |
institution | BVB |
isbn | 1596932147 1596932155 9781596932142 9781596932159 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028548674 |
oclc_num | 568023386 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxii, 287 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Artech House |
record_format | marc |
series2 | Artech House information security and privacy series |
spelling | Takanen, Ari Verfasser aut Fuzzing for software security testing and quality assurance Ari Takanen, Jared DeMott, Charlie Miller Boston Artech House ©2008 1 Online-Ressource (xxii, 287 pages) txt rdacontent c rdamedia cr rdacarrier Artech House information security and privacy series Includes bibliographical references and index Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Logiciels / Qualité / Contrôle COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer software / Development fast Computer security Computer networks Security measures Computer software Development Testen (DE-588)4367264-4 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 gnd rswk-swf Qualitätsmanagement (DE-588)4219057-5 gnd rswk-swf Softwareentwicklung (DE-588)4116522-6 s Computersicherheit (DE-588)4274324-2 s Qualitätsmanagement (DE-588)4219057-5 s Testen (DE-588)4367264-4 s 1\p DE-604 Demott, Jared D. Sonstige oth Miller, Charles Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Takanen, Ari Fuzzing for software security testing and quality assurance Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Logiciels / Qualité / Contrôle COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer software / Development fast Computer security Computer networks Security measures Computer software Development Testen (DE-588)4367264-4 gnd Computersicherheit (DE-588)4274324-2 gnd Softwareentwicklung (DE-588)4116522-6 gnd Qualitätsmanagement (DE-588)4219057-5 gnd |
subject_GND | (DE-588)4367264-4 (DE-588)4274324-2 (DE-588)4116522-6 (DE-588)4219057-5 |
title | Fuzzing for software security testing and quality assurance |
title_auth | Fuzzing for software security testing and quality assurance |
title_exact_search | Fuzzing for software security testing and quality assurance |
title_full | Fuzzing for software security testing and quality assurance Ari Takanen, Jared DeMott, Charlie Miller |
title_fullStr | Fuzzing for software security testing and quality assurance Ari Takanen, Jared DeMott, Charlie Miller |
title_full_unstemmed | Fuzzing for software security testing and quality assurance Ari Takanen, Jared DeMott, Charlie Miller |
title_short | Fuzzing for software security testing and quality assurance |
title_sort | fuzzing for software security testing and quality assurance |
topic | Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Logiciels / Qualité / Contrôle COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computer security fast Computer software / Development fast Computer security Computer networks Security measures Computer software Development Testen (DE-588)4367264-4 gnd Computersicherheit (DE-588)4274324-2 gnd Softwareentwicklung (DE-588)4116522-6 gnd Qualitätsmanagement (DE-588)4219057-5 gnd |
topic_facet | Sécurité informatique Réseaux d'ordinateurs / Sécurité / Mesures Logiciels / Qualité / Contrôle COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer security Computer software / Development Computer networks Security measures Computer software Development Testen Computersicherheit Softwareentwicklung Qualitätsmanagement |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=284247 |
work_keys_str_mv | AT takanenari fuzzingforsoftwaresecuritytestingandqualityassurance AT demottjaredd fuzzingforsoftwaresecuritytestingandqualityassurance AT millercharles fuzzingforsoftwaresecuritytestingandqualityassurance |