Fuzzing for software security testing and quality assurance /:
This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cas...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boston :
Artech House,
©2008.
|
Schriftenreihe: | Artech House information security and privacy series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools. |
Beschreibung: | 1 online resource (xxii, 287 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 1596932155 9781596932159 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn568023386 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 080929s2008 maua ob 001 0 eng d | ||
010 | |a 2008298533 | ||
040 | |a CCO |b eng |e pn |c CCO |d E7B |d OCLCQ |d YUS |d MEAUC |d OCLCQ |d SNK |d NNM |d N$T |d EBLCP |d MHW |d FVL |d B24X7 |d OCLCQ |d OCLCF |d DEBSZ |d OCLCQ |d AZK |d LOA |d JBG |d COCUF |d CNNOR |d MOR |d PIFAG |d OCLCQ |d OCLCA |d BRL |d STF |d WRM |d OCLCQ |d VTS |d NRAMU |d VT2 |d CUY |d OCLCQ |d WYU |d G3B |d ICG |d TKN |d A6Q |d M8D |d UHL |d OCLCQ |d UKCRE |d EYM |d IEEEE |d OCLCO |d OCLCQ |d OCL |d OCLCQ |d EYW |d OCLCO |d OCLCL |d OCLCQ | ||
015 | |a GBA8A2114 |2 bnb | ||
016 | 7 | |z 014683793 |2 Uk | |
019 | |a 434589922 |a 440648172 |a 503447753 |a 647824488 |a 712985088 |a 722726001 |a 728058137 |a 961569233 |a 962629621 |a 966261595 |a 988437800 |a 992029504 |a 1037426458 |a 1037923583 |a 1038576855 |a 1045522582 |a 1062924045 |a 1083561585 |a 1113463654 |a 1153543331 |a 1228562539 | ||
020 | |a 1596932155 |q (electronic bk.) | ||
020 | |a 9781596932159 |q (electronic bk.) | ||
020 | |z 1596932147 | ||
020 | |z 9781596932142 | ||
020 | |z 9781596932159 | ||
035 | |a (OCoLC)568023386 |z (OCoLC)434589922 |z (OCoLC)440648172 |z (OCoLC)503447753 |z (OCoLC)647824488 |z (OCoLC)712985088 |z (OCoLC)722726001 |z (OCoLC)728058137 |z (OCoLC)961569233 |z (OCoLC)962629621 |z (OCoLC)966261595 |z (OCoLC)988437800 |z (OCoLC)992029504 |z (OCoLC)1037426458 |z (OCoLC)1037923583 |z (OCoLC)1038576855 |z (OCoLC)1045522582 |z (OCoLC)1062924045 |z (OCoLC)1083561585 |z (OCoLC)1113463654 |z (OCoLC)1153543331 |z (OCoLC)1228562539 | ||
050 | 4 | |a QA76.9.A25 |b T335 2008eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Takanen, Ari. |0 http://id.loc.gov/authorities/names/n2007030098 | |
245 | 1 | 0 | |a Fuzzing for software security testing and quality assurance / |c Ari Takanen, Jared DeMott, Charlie Miller. |
260 | |a Boston : |b Artech House, |c ©2008. | ||
300 | |a 1 online resource (xxii, 287 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file |2 rda | ||
490 | 1 | |a Artech House information security and privacy series | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies. | |
520 | |a This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools. | ||
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Computer software |x Development. |0 http://id.loc.gov/authorities/subjects/sh85029535 | |
650 | 0 | |a Computer software |x Quality control. |0 http://id.loc.gov/authorities/subjects/sh97003403 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Logiciels |x Qualité |x Contrôle. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer software |x Quality control |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software |x Development |2 fast | |
655 | 4 | |a Computer network resources. | |
700 | 1 | |a DeMott, Jared. |0 http://id.loc.gov/authorities/names/nb2008017733 | |
700 | 1 | |a Miller, Charles, |d 1951- |1 https://id.oclc.org/worldcat/entity/E39PCjHtRGBPW6CbtxXtFBpF8C |0 http://id.loc.gov/authorities/names/n94094332 | |
776 | 0 | 8 | |i Print version: |a Takanen, Ari. |t Fuzzing for software security testing and quality assurance. |d Boston : Artech House, ©2008 |w (DLC) 2008298533 |
830 | 0 | |a Artech House information security and privacy series. |0 http://id.loc.gov/authorities/names/no2007048455 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284247 |3 Volltext |
938 | |a IEEE |b IEEE |n 9106105 | ||
938 | |a Books 24x7 |b B247 |n bks00027206 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL456884 | ||
938 | |a ebrary |b EBRY |n ebr10312946 | ||
938 | |a EBSCOhost |b EBSC |n 284247 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn568023386 |
---|---|
_version_ | 1816881709803634689 |
adam_text | |
any_adam_object | |
author | Takanen, Ari |
author2 | DeMott, Jared Miller, Charles, 1951- |
author2_role | |
author2_variant | j d jd c m cm |
author_GND | http://id.loc.gov/authorities/names/n2007030098 http://id.loc.gov/authorities/names/nb2008017733 http://id.loc.gov/authorities/names/n94094332 |
author_facet | Takanen, Ari DeMott, Jared Miller, Charles, 1951- |
author_role | |
author_sort | Takanen, Ari |
author_variant | a t at |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 T335 2008eb |
callnumber-search | QA76.9.A25 T335 2008eb |
callnumber-sort | QA 276.9 A25 T335 42008EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies. |
ctrlnum | (OCoLC)568023386 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04844cam a2200781Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn568023386</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">080929s2008 maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2008298533</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CCO</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YUS</subfield><subfield code="d">MEAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SNK</subfield><subfield code="d">NNM</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MHW</subfield><subfield code="d">FVL</subfield><subfield code="d">B24X7</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">LOA</subfield><subfield code="d">JBG</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">NRAMU</subfield><subfield code="d">VT2</subfield><subfield code="d">CUY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">ICG</subfield><subfield code="d">TKN</subfield><subfield code="d">A6Q</subfield><subfield code="d">M8D</subfield><subfield code="d">UHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">EYM</subfield><subfield code="d">IEEEE</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EYW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBA8A2114</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="z">014683793</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">434589922</subfield><subfield code="a">440648172</subfield><subfield code="a">503447753</subfield><subfield code="a">647824488</subfield><subfield code="a">712985088</subfield><subfield code="a">722726001</subfield><subfield code="a">728058137</subfield><subfield code="a">961569233</subfield><subfield code="a">962629621</subfield><subfield code="a">966261595</subfield><subfield code="a">988437800</subfield><subfield code="a">992029504</subfield><subfield code="a">1037426458</subfield><subfield code="a">1037923583</subfield><subfield code="a">1038576855</subfield><subfield code="a">1045522582</subfield><subfield code="a">1062924045</subfield><subfield code="a">1083561585</subfield><subfield code="a">1113463654</subfield><subfield code="a">1153543331</subfield><subfield code="a">1228562539</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1596932155</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781596932159</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1596932147</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781596932142</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781596932159</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)568023386</subfield><subfield code="z">(OCoLC)434589922</subfield><subfield code="z">(OCoLC)440648172</subfield><subfield code="z">(OCoLC)503447753</subfield><subfield code="z">(OCoLC)647824488</subfield><subfield code="z">(OCoLC)712985088</subfield><subfield code="z">(OCoLC)722726001</subfield><subfield code="z">(OCoLC)728058137</subfield><subfield code="z">(OCoLC)961569233</subfield><subfield code="z">(OCoLC)962629621</subfield><subfield code="z">(OCoLC)966261595</subfield><subfield code="z">(OCoLC)988437800</subfield><subfield code="z">(OCoLC)992029504</subfield><subfield code="z">(OCoLC)1037426458</subfield><subfield code="z">(OCoLC)1037923583</subfield><subfield code="z">(OCoLC)1038576855</subfield><subfield code="z">(OCoLC)1045522582</subfield><subfield code="z">(OCoLC)1062924045</subfield><subfield code="z">(OCoLC)1083561585</subfield><subfield code="z">(OCoLC)1113463654</subfield><subfield code="z">(OCoLC)1153543331</subfield><subfield code="z">(OCoLC)1228562539</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">T335 2008eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Takanen, Ari.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2007030098</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fuzzing for software security testing and quality assurance /</subfield><subfield code="c">Ari Takanen, Jared DeMott, Charlie Miller.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Boston :</subfield><subfield code="b">Artech House,</subfield><subfield code="c">©2008.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxii, 287 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Artech House information security and privacy series</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Development.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85029535</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Quality control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh97003403</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels</subfield><subfield code="x">Qualité</subfield><subfield code="x">Contrôle.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software</subfield><subfield code="x">Quality control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software</subfield><subfield code="x">Development</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Computer network resources.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">DeMott, Jared.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2008017733</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Charles,</subfield><subfield code="d">1951-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjHtRGBPW6CbtxXtFBpF8C</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94094332</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Takanen, Ari.</subfield><subfield code="t">Fuzzing for software security testing and quality assurance.</subfield><subfield code="d">Boston : Artech House, ©2008</subfield><subfield code="w">(DLC) 2008298533</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Artech House information security and privacy series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007048455</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284247</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">IEEE</subfield><subfield code="b">IEEE</subfield><subfield code="n">9106105</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00027206</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL456884</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10312946</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">284247</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Computer network resources. |
genre_facet | Computer network resources. |
id | ZDB-4-EBA-ocn568023386 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:17:02Z |
institution | BVB |
isbn | 1596932155 9781596932159 |
language | English |
lccn | 2008298533 |
oclc_num | 568023386 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxii, 287 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Artech House, |
record_format | marc |
series | Artech House information security and privacy series. |
series2 | Artech House information security and privacy series |
spelling | Takanen, Ari. http://id.loc.gov/authorities/names/n2007030098 Fuzzing for software security testing and quality assurance / Ari Takanen, Jared DeMott, Charlie Miller. Boston : Artech House, ©2008. 1 online resource (xxii, 287 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file rda Artech House information security and privacy series Includes bibliographical references and index. Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies. This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools. Print version record. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer software Development. http://id.loc.gov/authorities/subjects/sh85029535 Computer software Quality control. http://id.loc.gov/authorities/subjects/sh97003403 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels Qualité Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer software Quality control fast Computer networks Security measures fast Computer security fast Computer software Development fast Computer network resources. DeMott, Jared. http://id.loc.gov/authorities/names/nb2008017733 Miller, Charles, 1951- https://id.oclc.org/worldcat/entity/E39PCjHtRGBPW6CbtxXtFBpF8C http://id.loc.gov/authorities/names/n94094332 Print version: Takanen, Ari. Fuzzing for software security testing and quality assurance. Boston : Artech House, ©2008 (DLC) 2008298533 Artech House information security and privacy series. http://id.loc.gov/authorities/names/no2007048455 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284247 Volltext |
spellingShingle | Takanen, Ari Fuzzing for software security testing and quality assurance / Artech House information security and privacy series. Introduction -- Software vulnerability analysis -- Quality assurance and testing -- Fuzzing metrics -- Building and classifying fuzzers -- Target monitoring -- Advanced fuzzing -- Fuzzer comparison -- Fuzzing case studies. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer software Development. http://id.loc.gov/authorities/subjects/sh85029535 Computer software Quality control. http://id.loc.gov/authorities/subjects/sh97003403 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels Qualité Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer software Quality control fast Computer networks Security measures fast Computer security fast Computer software Development fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh85029535 http://id.loc.gov/authorities/subjects/sh97003403 https://id.nlm.nih.gov/mesh/D016494 |
title | Fuzzing for software security testing and quality assurance / |
title_auth | Fuzzing for software security testing and quality assurance / |
title_exact_search | Fuzzing for software security testing and quality assurance / |
title_full | Fuzzing for software security testing and quality assurance / Ari Takanen, Jared DeMott, Charlie Miller. |
title_fullStr | Fuzzing for software security testing and quality assurance / Ari Takanen, Jared DeMott, Charlie Miller. |
title_full_unstemmed | Fuzzing for software security testing and quality assurance / Ari Takanen, Jared DeMott, Charlie Miller. |
title_short | Fuzzing for software security testing and quality assurance / |
title_sort | fuzzing for software security testing and quality assurance |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer software Development. http://id.loc.gov/authorities/subjects/sh85029535 Computer software Quality control. http://id.loc.gov/authorities/subjects/sh97003403 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels Qualité Contrôle. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer software Quality control fast Computer networks Security measures fast Computer security fast Computer software Development fast |
topic_facet | Computer security. Computer networks Security measures. Computer software Development. Computer software Quality control. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. Logiciels Qualité Contrôle. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer software Quality control Computer networks Security measures Computer security Computer software Development Computer network resources. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=284247 |
work_keys_str_mv | AT takanenari fuzzingforsoftwaresecuritytestingandqualityassurance AT demottjared fuzzingforsoftwaresecuritytestingandqualityassurance AT millercharles fuzzingforsoftwaresecuritytestingandqualityassurance |