The software vulnerability guide:
Saved in:
Bibliographic Details
Main Author: Thompson, Herbert H. (Author)
Format: Electronic eBook
Language:English
Published: Hingham, Mass. Charles River Media c2005
Edition:1st ed
Subjects:
Online Access:FAW01
FAW02
Volltext
Item Description:Title from title screen
Includes bibliographical references and index
A call to action -- Security background -- Some useful tools -- Problems with permissions -- Permitting default or weak passwords -- Shells, scripts, and macros -- Dynamic linking and loading -- Buffer overflow vulnerabilities -- Proprietary formats and protocols -- Format string vulnerabilities -- Integer overflow vulnerabilities -- Storing passwords in plain text -- Creating temporary files -- Leaving things in memory -- The swap file and incomplete deletes -- Spoofing and the man-in-the-middle attacks -- Volunteering too much information -- Cross-site scripting -- Forceful browsing -- Parameter tampering, cookie poisoning, and hidden field manipulation --- SQL injection vulnerabilities -- Additional browser security issues -- Conclusion -- Appendixes: A. About the CD-ROM -- B. Open source software licenses
Annotation
Physical Description:1 Online-Ressource (xiii, 354 p.)
ISBN:1584506474
9781584503583
9781584506478

There is no print copy available.

Interlibrary loan Place Request Caution: Not in THWS collection! Get full text