StartGroepenDiscussieMeerTijdgeest
Doorzoek de site
Onze site gebruikt cookies om diensten te leveren, prestaties te verbeteren, voor analyse en (indien je niet ingelogd bent) voor advertenties. Door LibraryThing te gebruiken erken je dat je onze Servicevoorwaarden en Privacybeleid gelezen en begrepen hebt. Je gebruik van de site en diensten is onderhevig aan dit beleid en deze voorwaarden.

Resultaten uit Google Boeken

Klik op een omslag om naar Google Boeken te gaan.

The Art of Software Security Testing:…
Bezig met laden...

The Art of Software Security Testing: Identifying Software Security Flaws (editie 2006)

door Chris Wysopal (Auteur)

LedenBesprekingenPopulariteitGemiddelde beoordelingDiscussies
17Geen1,252,475GeenGeen
Risk-based security testing, the important subject of this book, is one of seven software security touchpoints introduced in my book, Software Security: Building Security In. This book takes the basic idea several steps forward. Written by masters of software exploit, this book describes in very basic terms how security testing differs from standard software testing as practiced by QA groups everywhere. It unifies in one place ideas from Michael Howard, David Litchfield, Greg Hoglund, and me into a concise introductory package. Improve your security testing by reading this book today." -Gary McGraw, Ph.D., CTO, Cigital; Author, Software Security, Exploiting Software, Building Secure Software, and Software Fault Injection; www.cigital.com/~gem nbsp; "As 2006 closes out, we will see over 5,000 software vulnerabilities announced to the public. Many of these vulnerabilities were, or will be, found in enterprise applications from companies who are staffed with large, professional, QA teams. How then can it be that these flaws consistently continue to escape even well-structured diligent testing? The answer, in part, is that testing still by and large only scratches the surface when validating the presence of security flaws. Books such as this hopefully will start to bring a more thorough level of understanding to the arena of security testing and make us all a little safer over time." -Alfred Huger, Senior Director, Development, Symantec Corporation nbsp; "Software security testing may indeed be an art, but this book provides the paint-by-numbers to perform good, solid, and appropriately destructive security testing: proof that an ounce of creative destruction is worth a pound of patching later. If understanding how software can be broken is step one in every programmers'' twelve-step program to defensible, secure, robust software, then knowledgeable security testing comprises at least steps two through six." -Mary Ann Davidson, Chief Security Officer, Oracle nbsp; "Over the past few years, several excellent books have come out teaching developers how to write more secure software by describing common security failure patterns. However, none of these books have targeted the tester whose job it is to find the security problems before they make it out of the R&D lab and into customer hands. Into this void comes The Art of Software Security Testing: Identifying Software Security Flaws. The authors, all of whom have extensive experience in security testing, explain how to use free tools to find the problems in software, giving plenty of examples of what a software flaw looks like when it shows up in the test tool. The reader learns why security flaws are different from other types of bugs (we want to know not only that ''the program does what it''s supposed to,'' but also that ''the program doesn''t do that which it''s not supposed to''), and how to use the tools to find them. Examples are primarily based on C code, but some description of Java, C#, and scripting languages help for those environments. The authors cover both Windows and UNIX-based test tools, with plenty of screenshots to see what to expect. Anyone who''s doing QA testing on software should read this book, whether as a refresher for finding security problems, or as a starting point for QA people who have focused on testing functionality." -Jeremy Epstein, WebMethods nbsp; State-of-the-Art Software Security Testing: Expert, Up to Date, and Comprehensive nbsp; The Art of Software Security Testing delivers in-depth, up-to-date, battle-tested techniques for anticipating and identifying software security problems before the "bad guys" do. nbsp; Drawing on decades of experience in application and penetration testing, this book''s authors can help you transform your approach from mere "verification" to proactive "attack." The authors begin by systematically reviewing the design and coding vulnerabilities that can arise in software, and offering realistic guidance in avoiding them. Next, they show you ways to customize software debugging tools to test the unique aspects of any program and then analyze the results to identify exploitable vulnerabilities. nbsp; Coverage includes Tips on how to think the way software attackers think to strengthen your defense strategy Cost-effectively integrating security testing into your development lifecycle Using threat modeling to prioritize testing based on your top areas of risk Building testing labs for performing white-, grey-, and black-box software testing Choosing and using the right tools for each testing project Executing today''s leading attacks, from fault injection to buffer overflows Determining which flaws are most likely to be exploited by real-world attackers nbsp; This book is indispensable for every technical professional responsible for software security: testers, QA specialists, security professionals, developers, and more. For IT managers and leaders, it offers a proven blueprint for implementing effective security testing or strengthening existing processes. nbsp; Foreword xiii Preface xvii Acknowledgments xxix About the Authors xxxi nbsp; Part I: Introduction Chapter 1: Case Your Own Joint: A Paradigm Shift from Traditional Software Testingnbsp; 3 Chapter 2: How Vulnerabilities Get Into All Softwarenbsp; 19 Chapter 3: The Secure Software Development Lifecyclenbsp; 55 Chapter 4: Risk-Based Security Testing: Prioritizing Security Testing with Threat Modelingnbsp; 73 Chapter 5: Shades of Analysis: White, Gray, and Black Box Testingnbsp; 93 nbsp; Part II: Performing the Attacks Chapter 6: Generic Network Fault Injectionnbsp; 107 Chapter 7: Web Applications: Session Attacksnbsp; 125 Chapter 8: Web Applications: Common Issuesnbsp; 141 Chapter 9: Web Proxies: Using WebScarab nbsp;169 Chapter 10: Implementing a Custom Fuzz Utilitynbsp; 185 Chapter 11: Local Fault Injectionnbsp; 201 nbsp; Part III: Analysis Chapter 12: Determining Exploitabilitynbsp; 233 nbsp; Indexnbsp; 251… (meer)
Lid:OneThingBYTE
Titel:The Art of Software Security Testing: Identifying Software Security Flaws
Auteurs:Chris Wysopal (Auteur)
Info:Addison-Wesley Professional (2006), Edition: 1, 312 pages
Verzamelingen:Jouw bibliotheek, Aan het lezen, Te lezen
Waardering:
Trefwoorden:to-read

Informatie over het werk

The Art of Software Security Testing: Identifying Software Security Flaws door Chris Wysopal

Geen
Bezig met laden...

Meld je aan bij LibraryThing om erachter te komen of je dit boek goed zult vinden.

Op dit moment geen Discussie gesprekken over dit boek.

Geen besprekingen
geen besprekingen | voeg een bespreking toe

» Andere auteurs toevoegen

AuteursnaamRolType auteurWerk?Status
Chris Wysopalprimaire auteuralle editiesberekend
Dustin, Elfriedeprimaire auteuralle editiesbevestigd
Nelson, Lucasprimaire auteuralle editiesbevestigd
Zovi, Dino Daiprimaire auteuralle editiesbevestigd
Je moet ingelogd zijn om Algemene Kennis te mogen bewerken.
Voor meer hulp zie de helppagina Algemene Kennis .
Gangbare titel
Oorspronkelijke titel
Alternatieve titels
Oorspronkelijk jaar van uitgave
Mensen/Personages
Belangrijke plaatsen
Belangrijke gebeurtenissen
Verwante films
Motto
Opdracht
Eerste woorden
Citaten
Laatste woorden
Ontwarringsbericht
Uitgevers redacteuren
Auteur van flaptekst/aanprijzing
Oorspronkelijke taal
Gangbare DDC/MDS
Canonieke LCC

Verwijzingen naar dit werk in externe bronnen.

Wikipedia in het Engels (1)

Risk-based security testing, the important subject of this book, is one of seven software security touchpoints introduced in my book, Software Security: Building Security In. This book takes the basic idea several steps forward. Written by masters of software exploit, this book describes in very basic terms how security testing differs from standard software testing as practiced by QA groups everywhere. It unifies in one place ideas from Michael Howard, David Litchfield, Greg Hoglund, and me into a concise introductory package. Improve your security testing by reading this book today." -Gary McGraw, Ph.D., CTO, Cigital; Author, Software Security, Exploiting Software, Building Secure Software, and Software Fault Injection; www.cigital.com/~gem nbsp; "As 2006 closes out, we will see over 5,000 software vulnerabilities announced to the public. Many of these vulnerabilities were, or will be, found in enterprise applications from companies who are staffed with large, professional, QA teams. How then can it be that these flaws consistently continue to escape even well-structured diligent testing? The answer, in part, is that testing still by and large only scratches the surface when validating the presence of security flaws. Books such as this hopefully will start to bring a more thorough level of understanding to the arena of security testing and make us all a little safer over time." -Alfred Huger, Senior Director, Development, Symantec Corporation nbsp; "Software security testing may indeed be an art, but this book provides the paint-by-numbers to perform good, solid, and appropriately destructive security testing: proof that an ounce of creative destruction is worth a pound of patching later. If understanding how software can be broken is step one in every programmers'' twelve-step program to defensible, secure, robust software, then knowledgeable security testing comprises at least steps two through six." -Mary Ann Davidson, Chief Security Officer, Oracle nbsp; "Over the past few years, several excellent books have come out teaching developers how to write more secure software by describing common security failure patterns. However, none of these books have targeted the tester whose job it is to find the security problems before they make it out of the R&D lab and into customer hands. Into this void comes The Art of Software Security Testing: Identifying Software Security Flaws. The authors, all of whom have extensive experience in security testing, explain how to use free tools to find the problems in software, giving plenty of examples of what a software flaw looks like when it shows up in the test tool. The reader learns why security flaws are different from other types of bugs (we want to know not only that ''the program does what it''s supposed to,'' but also that ''the program doesn''t do that which it''s not supposed to''), and how to use the tools to find them. Examples are primarily based on C code, but some description of Java, C#, and scripting languages help for those environments. The authors cover both Windows and UNIX-based test tools, with plenty of screenshots to see what to expect. Anyone who''s doing QA testing on software should read this book, whether as a refresher for finding security problems, or as a starting point for QA people who have focused on testing functionality." -Jeremy Epstein, WebMethods nbsp; State-of-the-Art Software Security Testing: Expert, Up to Date, and Comprehensive nbsp; The Art of Software Security Testing delivers in-depth, up-to-date, battle-tested techniques for anticipating and identifying software security problems before the "bad guys" do. nbsp; Drawing on decades of experience in application and penetration testing, this book''s authors can help you transform your approach from mere "verification" to proactive "attack." The authors begin by systematically reviewing the design and coding vulnerabilities that can arise in software, and offering realistic guidance in avoiding them. Next, they show you ways to customize software debugging tools to test the unique aspects of any program and then analyze the results to identify exploitable vulnerabilities. nbsp; Coverage includes Tips on how to think the way software attackers think to strengthen your defense strategy Cost-effectively integrating security testing into your development lifecycle Using threat modeling to prioritize testing based on your top areas of risk Building testing labs for performing white-, grey-, and black-box software testing Choosing and using the right tools for each testing project Executing today''s leading attacks, from fault injection to buffer overflows Determining which flaws are most likely to be exploited by real-world attackers nbsp; This book is indispensable for every technical professional responsible for software security: testers, QA specialists, security professionals, developers, and more. For IT managers and leaders, it offers a proven blueprint for implementing effective security testing or strengthening existing processes. nbsp; Foreword xiii Preface xvii Acknowledgments xxix About the Authors xxxi nbsp; Part I: Introduction Chapter 1: Case Your Own Joint: A Paradigm Shift from Traditional Software Testingnbsp; 3 Chapter 2: How Vulnerabilities Get Into All Softwarenbsp; 19 Chapter 3: The Secure Software Development Lifecyclenbsp; 55 Chapter 4: Risk-Based Security Testing: Prioritizing Security Testing with Threat Modelingnbsp; 73 Chapter 5: Shades of Analysis: White, Gray, and Black Box Testingnbsp; 93 nbsp; Part II: Performing the Attacks Chapter 6: Generic Network Fault Injectionnbsp; 107 Chapter 7: Web Applications: Session Attacksnbsp; 125 Chapter 8: Web Applications: Common Issuesnbsp; 141 Chapter 9: Web Proxies: Using WebScarab nbsp;169 Chapter 10: Implementing a Custom Fuzz Utilitynbsp; 185 Chapter 11: Local Fault Injectionnbsp; 201 nbsp; Part III: Analysis Chapter 12: Determining Exploitabilitynbsp; 233 nbsp; Indexnbsp; 251

Geen bibliotheekbeschrijvingen gevonden.

Boekbeschrijving
Haiku samenvatting

Actuele discussies

Geen

Populaire omslagen

Snelkoppelingen

Waardering

Gemiddelde: Geen beoordelingen.

Ben jij dit?

Word een LibraryThing Auteur.

 

Over | Contact | LibraryThing.com | Privacy/Voorwaarden | Help/Veelgestelde vragen | Blog | Winkel | APIs | TinyCat | Nagelaten Bibliotheken | Vroege Recensenten | Algemene kennis | 206,307,264 boeken! | Bovenbalk: Altijd zichtbaar