The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities (Paperback)
暫譯: 軟體安全評估的藝術:識別與防止軟體漏洞
Mark Dowd, John McDonald, Justin Schuh
- 出版商: Addison Wesley
- 出版日期: 2006-11-01
- 售價: $3,260
- 貴賓價: 9.5 折 $3,097
- 語言: 英文
- 頁數: 1200
- 裝訂: Paperback
- ISBN: 0321444426
- ISBN-13: 9780321444424
-
相關分類:
資訊安全
已絕版
買這商品的人也買了...
-
$2,380$2,261 -
$1,140Designing Interactive Systems: People, Activities, Contexts, Technologies (Hardcover)
-
$1,200$1,176 -
$2,205The Java Programming Language, 4/e (Paperback)
-
$650$553 -
$780$663 -
$650$507 -
$550$468 -
$650$507 -
$480$379 -
$720$612 -
$550$429 -
$650$553 -
$680$537 -
$580$493 -
$580$493 -
$600$480 -
$1,860$1,767 -
$2,808Criminalistics: An Introduction to Forensic Science, 9/e (美國原版)
-
$580$493 -
$1,980$1,881 -
$500$425 -
$611黑客攻防技術寶典 ─ Web 實戰篇, 2/e
-
$1,650$1,568 -
$1,995Gray Hat Hacking: The Ethical Hacker's Handbook, 6/e (Paperback)
相關主題
商品描述
Description
There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”
—Halvar Flake, CEO and head of research, SABRE Security GmbH
The Definitive Insider’s Guide to Auditing Software Security
This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.
The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.
Coverage includes
• Code auditing: theory, practice, proven methodologies, and secrets of the trade
• Bridging the gap between secure software design and post-implementation review
• Performing architectural assessment: design review, threat modeling, and operational review
• Identifying vulnerabilities related to memory management, data types, and malformed data
• UNIX/Linux assessment: privileges, files, and processes
• Windows-specific issues, including objects and the filesystem
• Auditing interprocess communication, synchronization, and state
• Evaluating network software: IP stacks, firewalls, and common application protocols
• Auditing Web applications and technologies
This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.
Table of Contents
ABOUT THE AUTHORS xv
PREFACE xvii
ACKNOWLEDGMENTS xxi
I Introduction to Software Security Assessment
1 SOFTWARE VULNERABILITY FUNDAMENTALS 3
2 DESIGN REVIEW 25
3 OPERATIONAL REVIEW 67
4 APPLICATION REVIEW PROCESS 91
II Software Vulnerabilities
5 MEMORY CORRUPTION 167
6 C LANGUAGE ISSUES 203
7 PROGRAM BUILDING BLOCKS 297
8 STRINGS ANDMETACHARACTERS 387
9 UNIX I: PRIVILEGES AND FILES 459
10 UNIX II: PROCESSES 559
11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625
12 WINDOWS II: INTERPROCESS COMMUNICATION 685
13 SYNCHRONIZATION AND STATE 755
III Software Vulnerabilities in Practice
14 NETWORK PROTOCOLS 829
15 FIREWALLS 891
16 NETWORK APPLICATION PROTOCOLS 921
17 WEB APPLICATIONS 1007
18 WEB TECHNOLOGIES 1083
BIBLIOGRAPHY 1125
INDEX 1129
商品描述(中文翻譯)
**描述**
「市場上有許多安全程式設計的書籍,但沒有一本能像這本書一樣深入。其深度和細節超過我所知道的所有書籍一個數量級。」
— **Halvar Flake,SABRE Security GmbH 首席執行官及研究主管**
**徹底的軟體安全審計內部指南**
這是有史以來最詳細、最複雜且最有用的軟體安全審計指南之一。作者是領先的安全顧問和研究人員,他們親自發現了從 sendmail 到 Microsoft Exchange、Check Point VPN 到 Internet Explorer 等應用程式中的漏洞。基於他們非凡的經驗,他們介紹了一種從頭到尾的「拆解」應用程式的方法,以揭示即使是最微妙和隱藏的安全缺陷。
《軟體安全評估的藝術》涵蓋了 UNIX/Linux 和 Windows 環境中所有類型的軟體漏洞。它展示了如何對各種大小和功能的應用程式進行安全審計,包括網路和 Web 軟體。此外,它還通過大量來自許多業界最高知名度應用程式的過去缺陷的實際程式碼範例進行教學。
涵蓋內容包括:
- 程式碼審計:理論、實踐、經驗法則和行業秘密
- 橋接安全軟體設計與實施後審查之間的差距
- 進行架構評估:設計審查、威脅建模和操作審查
- 識別與記憶管理、資料類型和格式錯誤資料相關的漏洞
- UNIX/Linux 評估:權限、檔案和過程
- Windows 特定問題,包括物件和檔案系統
- 審計進程間通訊、同步和狀態
- 評估網路軟體:IP 堆疊、防火牆和常見應用程式協定
- 審計 Web 應用程式和技術
這本書是所有必須交付安全軟體或確保現有軟體安全的人的前所未有的資源:顧問、安全專家、開發人員、QA 人員、測試人員和管理員等。
**目錄**
關於作者 xv
前言 xvii
致謝 xxi
I 軟體安全評估介紹
1 軟體漏洞基礎 3
2 設計審查 25
3 操作審查 67
4 應用程式審查過程 91
II 軟體漏洞
5 記憶體損壞 167
6 C 語言問題 203
7 程式建構模組 297
8 字串與元字元 387
9 UNIX I:權限與檔案 459
10 UNIX II:過程 559
11 Windows I:物件與檔案系統 625
12 Windows II:進程間通訊 685
13 同步與狀態 755
III 實踐中的軟體漏洞
14 網路協定 829
15 防火牆 891
16 網路應用程式協定 921
17 Web 應用程式 1007
18 Web 技術 1083
參考文獻 1125
索引 1129