The software vulnerability guide:
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Thompson, Herbert H. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Hingham, Mass. Charles River Media c2005
Ausgabe:1st ed
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Beschreibung:Title from title screen
Includes bibliographical references and index
A call to action -- Security background -- Some useful tools -- Problems with permissions -- Permitting default or weak passwords -- Shells, scripts, and macros -- Dynamic linking and loading -- Buffer overflow vulnerabilities -- Proprietary formats and protocols -- Format string vulnerabilities -- Integer overflow vulnerabilities -- Storing passwords in plain text -- Creating temporary files -- Leaving things in memory -- The swap file and incomplete deletes -- Spoofing and the man-in-the-middle attacks -- Volunteering too much information -- Cross-site scripting -- Forceful browsing -- Parameter tampering, cookie poisoning, and hidden field manipulation --- SQL injection vulnerabilities -- Additional browser security issues -- Conclusion -- Appendixes: A. About the CD-ROM -- B. Open source software licenses
Annotation
Beschreibung:1 Online-Ressource (xiii, 354 p.)
ISBN:1584506474
9781584503583
9781584506478

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen