Note: This is now a 2 volume set which is shrink wrapped. Computer software is an integral part of modern society. Companies rely on applications to manage client information, payment data, and inventory tracking. Consumers use software for a variety of different reasons as well--to manage their daily lives, to communicate with friends and family, and to browse resources made available on the internet, to name a few. With such a heavy reliance on software in our society, questions surrounding the security of the pieces of software performing these various tasks begin to arise. Is the software we are using really secure? How can we verify that it is? And what are the implications of a particular application being compromised? These are some of the questions that this book attempts to address. This book sheds light on the theory and practice of code auditing--how to rip apart an application and discover security vulnerabilities.
Les informations fournies dans la section « Synopsis » peuvent faire référence à une autre édition de ce titre.
Mark Dowd is a principal security architect at McAfee, Inc. and an established expert in the field of application security. His professional experience includes several years as a senior researcher at Internet Security Systems (ISS) X-Force, and the discovery of a number of high-profile vulnerabilities in ubiquitous Internet software. He is responsible for identifying and helping to address critical flaws in Sendmail, Microsoft Exchange Server, OpenSSH, Internet Explorer, Mozilla (Firefox), Checkpoint VPN, and Microsoft’s SSL implementation. In addition to his research work, Mark presents at industry conferences, including Black Hat and RUXCON. John McDonald is a senior consultant with Neohapsis, where he specializes in advanced application security assessment across a broad range of technologies and platforms. He has an established reputation in software security, including work in security architecture and vulnerability research for NAI (now McAfee), Data Protect GmbH, and Citibank. As a vulnerability researcher, John has identified and helped resolve numerous critical vulnerabilities, including issues in Solaris, BSD, Checkpoint FireWall-1, OpenSSL, and BIND. Justin Schuh is a senior consultant with Neohapsis, where he leads the Application Security Practice. As a senior consultant and practice lead, he performs software security assessments across a range of systems, from embedded device firmware to distributed enterprise web applications. Prior to his employment with Neohapsis, Justin spent nearly a decade in computer security activities at the Department of Defense (DoD) and related agencies. His government service includes a role as a lead researcher with the National Security Agency (NSA) penetration testing team–the Red Team.
Les informations fournies dans la section « A propos du livre » peuvent faire référence à une autre édition de ce titre.
EUR 43,56 expédition depuis Etats-Unis vers France
Destinations, frais et délaisEUR 26,14 expédition depuis Etats-Unis vers France
Destinations, frais et délaisVendeur : thebookforest.com, San Rafael, CA, Etats-Unis
Etat : LikeNew. Text block, wraps and binding are in like new condition, without markings of any kind. Supporting Bay Area Friends of the Library since 2010. Well packaged and promptly shipped. N° de réf. du vendeur 1LAUHV002YJU
Quantité disponible : 1 disponible(s)
Vendeur : Goodwill San Antonio, San Antonio, TX, Etats-Unis
Etat : Acceptable. Minor Wear, in Fine Shape Good Reading Copy, May have minor shelf wear, Fast Shipping - Safe and Secure in Mailer. N° de réf. du vendeur 4Q2SPP001T2P
Quantité disponible : 1 disponible(s)
Vendeur : Seattle Goodwill, Seattle, WA, Etats-Unis
Etat : Good. May have some shelf-wear due to normal use. Your purchase funds free job training and education in the greater Seattle area. Thank you for supporting Goodwills nonprofit mission! N° de réf. du vendeur 0KVOG200898Z_ns
Quantité disponible : 1 disponible(s)
Vendeur : Salish Sea Books, Bellingham, WA, Etats-Unis
Etat : Good. Good++; Softcover; Single Volume Edition; Covers are still glossy with a few light handling-marks; Unblemished textblock edges; The endpapers and all text pages are clean and unmarked; The binding is excellent with a straight spine; This book will be shipped in a sturdy cardboard box with foam padding; Medium Format (8.5" - 9.75" tall); 3.7 lbs; White and blue covers with title in black and red lettering; 2006, Addison-Wesley Publishing; 1174 pages; "The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities ," by Mark Dowd, et al. N° de réf. du vendeur SKU-1044AG09103195
Quantité disponible : 1 disponible(s)
Vendeur : Wrigley Books, Austin, TX, Etats-Unis
Paperback. Etat : very good. Used items may not include media like access codes or CDs. Fast shipping! Expedited orders take 1-3 business days! Media mail may take up to 5 business days. N° de réf. du vendeur 3C-9780321444424-V
Quantité disponible : 1 disponible(s)
Vendeur : Pella Books, Pella, IA, Etats-Unis
Trade Paperback. Etat : Used Good. Trade paperback,very thick, no writing or marks, very light wear. N° de réf. du vendeur 234459
Quantité disponible : 1 disponible(s)
Vendeur : Wonder Book, Frederick, MD, Etats-Unis
Etat : As New. Like New condition. Volume 1. A near perfect copy that may have very minor cosmetic defects. NOT AVAILABLE FOR SHIPMENT OUTSIDE OF THE UNITED STATES. N° de réf. du vendeur B04A-03145
Quantité disponible : 1 disponible(s)
Vendeur : dsmbooks, Liverpool, Royaume-Uni
Paperback. Etat : Good. Good. book. N° de réf. du vendeur D7S9-1-M-0321444426-3
Quantité disponible : 1 disponible(s)
Vendeur : SGS Trading Inc, Franklin Lakes, NJ, Etats-Unis
Paperback. Etat : Good. US Edition Textbook, May Have Highlights, Notes and/or Underlining, BOOK ONLY-NO ACCESS CODE, NO CD, Ships with Emailed Tracking from USA. N° de réf. du vendeur Jul18-2nd321444426-2231
Quantité disponible : 2 disponible(s)
Vendeur : OM Books, Sevilla, SE, Espagne
Etat : usado - bueno. N° de réf. du vendeur 9780321444424
Quantité disponible : 1 disponible(s)