Software ausnutzen: Wie man Code knackt von Hoglund, Greg-

Ursprünglicher Text
Exploiting Software: How to Break Code by Hoglund, Greg
MTW Youth
(406212)
Angemeldet als gewerblicher Verkäufer
US $4,68
Ca.EUR 4,00
Artikelzustand:
Gut
Gutes tun. Dieser Verkauf kommt wohltätigen Zwecken zugute.
Ganz entspannt. Kostenloser Versand & Rückversand.
Versand:
Kostenlos USPS Media MailTM.
Standort: Boston, Massachusetts, USA
Lieferung:
Lieferung zwischen Sa, 11. Okt und Sa, 18. Okt bei heutigem Zahlungseingang
Liefertermine - wird in neuem Fenster oder Tab geöffnet berücksichtigen die Bearbeitungszeit des Verkäufers, die PLZ des Artikelstandorts und des Zielorts sowie den Annahmezeitpunkt und sind abhängig vom gewählten Versandservice und dem ZahlungseingangZahlungseingang - wird ein neuem Fenster oder Tab geöffnet. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Kostenloser Rückversand.
Zahlungen:
   Diners Club 

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet

  • Gratis Rückversand im Inland
  • Punkte für jeden Kauf und Verkauf
  • Exklusive Plus-Deals
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:306535278345
Zuletzt aktualisiert am 07. Okt. 2025 13:54:09 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Der Erlös nach Kosten geht an More Than Words Inc.

More Than Words is a nonprofit social enterprise that empowers youth who are in the foster care system, court involved, homeless, or out of school to take charge of their lives by taking charge of a ...
  • Offizielles eBay für Charity-Angebot. Mehr erfahren
  • Verkauf zugunsten einer geprüften gemeinnützigen Partnerorganisation.

Artikelmerkmale

Artikelzustand
Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
Book Title
Exploiting Software: How to Break Code
Genre
Specialty Boutique
Topic
Internet & Social Media
Narrative Type
Nonfiction
Intended Audience
Adult
Inscribed
NO
ISBN
9780201786958
Kategorie

Über dieses Produkt

Product Identifiers

Publisher
Addison Wesley Professional
ISBN-10
0201786958
ISBN-13
9780201786958
eBay Product ID (ePID)
6062117

Product Key Features

Number of Pages
512 Pages
Publication Name
Exploiting Software : How to Break Code
Language
English
Subject
Software Development & Engineering / Quality Assurance & Testing, Networking / Vendor Specific, Security / General
Publication Year
2004
Type
Textbook
Author
Greg Hoglund, Karen Karen Gettman, Gary Mcgraw
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
1 in
Item Weight
31.1 Oz
Item Length
9.3 in
Item Width
7.6 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2003-025556
Dewey Edition
22
Number of Volumes
3 vols.
Illustrated
Yes
Dewey Decimal
005.8
Table Of Content
Attack Patterns. Foreword. Preface. What This Book Is About. How to Use This Book. But Isn't This Too Dangerous? Acknowledgments. 1. Software--The Root of the Problem. A Brief History of Software. Bad Software Is Ubiquitous. The Trinity of Trouble. The Future of Software. What Is Software Security? Conclusion. 2. Attack Patterns. A Taxonomy. An Open-Systems View. Tour of an Exploit. Attack Patterns: Blueprints for Disaster. An Example Exploit: Microsoft's Broken C++ Compiler. Applying Attack Patterns. Attack Pattern Boxes. Conclusion. 3. Reverse Engineering and Program Understanding. Into the House of Logic. Should Reverse Engineering Be Illegal? Reverse Engineering Tools and Concepts. Methods of the Reverser. Writing Interactive Disassembler (IDA) Plugins. Decompiling and Disassembling Software. Decompilation in Practice: Reversing helpctr.exe. Automatic, Bulk Auditing for Vulnerabilities. Writing Your Own Cracking Tools. Building a Basic Code Coverage Tool. Conclusion. 4. Exploiting Server Software. The Trusted Input Problem. The Privilege Escalation Problem. Finding Injection Points. Input Path Tracing. Exploiting Trust through Configuration. Specific Techniques and Attacks for Server Software. Conclusion. 5. Exploiting Client Software. Client-side Programs as Attack Targets. In-band Signals. Cross-site Scripting (XSS). Clients Scripts and Malicious Code. Content-Based Attacks. Backwash Attacks: Leveraging Client-side Buffer. Conclusion. 6. Crafting (Malicious) Input. The Defender's Dilemma.
Synopsis
Praise for Exploiting Software " Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design--a key change from where we are today " -- Tony Scott Chief Technology Officer, IS&S General Motors Corporation "It's about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play." -- Bruce Schneier Chief Technology Officer Counterpane Author of Beyond Fear and Secrets and Lies " Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the 'worm of the day' phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security." -- Elinor Mills Abreu Reuters' correspondent "Police investigators study how criminals think and act. Military strategists learn about the enemy's tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the 'white hats' understand how the 'black hats' operate. Through extensive examples and 'attack patterns, ' this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems. Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security." -- Jeremy Epstein Director, Product Security & Performance webMethods, Inc. "A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and expl, Using attack patterns, real code, and example exploits, students learn techniques that are used by real malicious hackers against software. The author team show to break code--if students want to protect software from attack, they must first learn how real attacks are really carried out.
LC Classification Number
QA76.9.A25H635 2004

Artikelbeschreibung des Verkäufers

Rechtliche Informationen des Verkäufers

Ich versichere, dass alle meine Verkaufsaktivitäten in Übereinstimmung mit allen geltenden Gesetzen und Vorschriften der EU erfolgen.
Info zu diesem Verkäufer

MTW Youth

99,2% positive Bewertungen1,7 Mio. Artikel verkauft

Mitglied seit Jul 2004
Antwortet meist innerhalb 48 Stunden
Angemeldet als gewerblicher Verkäufer
More Than Words is a non-profit workforce development & youth advocacy program that serves nearly 350 youth each year. We are a youth run business empowering youth to take charge of their lives by ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (511.482)

Alle Bewertungen
Positiv
Neutral
Negativ
  • 7***j (849)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    I recently purchased an item from this eBay seller, and I couldn't be happier with the experience. From the prompt communication to the fast shipping, everything was handled with utmost professionalism. The item arrived exactly as described and was well-packaged to ensure its safety during transit. The seller was courteous and responsive, making the entire transaction smooth and hassle-free. I highly recommend this seller to anyone looking for quality products and excellent service.
  • .***m (88)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    For some reason, the Postal Tracking stopped after the label was created, but I RECEIVED the book I ordered on August 2nd which was within the 7/31 to 8/6 projected delivery range. The sale price was lower than the competition why I chose this Seller. It was well packed, and arrived in the described condition. I would do business, again, with this Seller without hesitation. Thumbs UP!
  • 0***0 (136)- Bewertung vom Käufer.
    Letzte 6 Monate
    Bestätigter Kauf
    Another wonderful transaction with this company! I believe this is my 3rd purchase with multiple books in each order and I’ve yet to be disappointed. Books arrived as described - great used condition. Packaging wasn’t great but it’s free shipping and they made it to me intact, so no complaints. The price is unbeatable. Will definitely continue to purchase from them! Highly recommend.