|
![]() |
|||
|
||||
OverviewIn today's market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT infrastructures and the Internet. Most of these security bugs (and the viruses, worms, and exploits that derive from them) started out as programmer mistakes. With this easy-to-use guide, professional programmers and testers will learn how to recognize and prevent these vulnerabilities before their software reaches the market. For each of the 30 common software vulnerabilities featured the authors provide a summary, description of how the vulnerability occurs, and famous examples of how it has been used. Tips on how to find and fix the vulnerability in software are also provided along with source code snippets, commentary, tools, and techniques in easy-to-read sidebars. This guide is a must-have for today's software developers. Full Product DetailsAuthor: H. Thompson , Scott G. ChasePublisher: Cengage Learning, Inc Imprint: Charles River Media Dimensions: Width: 18.80cm , Height: 3.30cm , Length: 23.10cm Weight: 0.748kg ISBN: 9781584503583ISBN 10: 1584503580 Pages: 350 Publication Date: 01 June 2005 Audience: General/trade , Professional and scholarly , College/higher education , General , Professional & Vocational Format: Mixed media product Publisher's Status: Out of Print Availability: In Print ![]() Limited stock is available. It will be ordered for you and shipped pending supplier's limited stock. Table of ContentsReviewsAuthor InformationHerbert Thompson (Melbourne Beach, FL) is the Director of Security Technology at Security Innovation LLC. He holds a Ph.D. in Applied Mathematics from the Florida Institute of Technology and is CISSP, CCNA, and MCP certified. Scott Chase (Melbourne, FL) is the Director of Security Testing for Security Innovation LLC, where he manages a team of professional security testers and develops testing methodologies and tools. Tab Content 6Author Website:Countries AvailableAll regions |