Praise for Exploiting Software "Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no ...
Read More
Praise for Exploiting Software "Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design-a key change from where we are today!" - Tony Scott Chief Technology Officer, IS&S General Motors Corporation "It's about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play." - Bruce Schneier Chief Technology Officer Counterpane Author of Beyond Fear and Secrets and Lies "Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the 'worm of the day' phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security." - Elinor Mills Abreu Reuters' correspondent "Police investigators study how criminals think and act. Military strategists learn about the enemy's tactics, as well as their weapons and personnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in helping the 'white hats' understand how the 'black hats' operate. Through extensive examples and 'attack patterns,' this book helps the reader understand how attackers analyze software and use the results of the analysis to attack systems. Hoglund and McGraw explain not only how hackers attack servers, but also how malicious server operators can attack clients (and how each can protect themselves from the other). An excellent book for practicing security engineers, and an ideal book for an undergraduate class in software security." - Jeremy Epstein Director, Product Security & Performance webMethods, Inc. "A provocative and revealing book from two leading security experts and world class software exploiters, Exploiting Software enters the mind of the cleverest and wickedest crackers and shows you how they think. It illustrates general principles for breaking software, and provides you a whirlwind tour of techniques for finding and exploiting software vulnerabilities, along with detailed examples from real software exploits. Exploiting Software is essential reading for anyone responsible for placing software in a hostile environment-that is, everyone who writes or installs programs that run on the Internet." - Dave Evans, Ph.D. Associate Professor of Computer Science University of Virginia "The root cause for most of today's Internet hacker exploits and malicious software outbreaks are buggy software and faulty security software deployment. In Exploiting Software, Greg Hoglund and Gary McGraw help us in an interesting and provocative way to better defend ourselves against malicious hacker attacks on those software loopholes. The information in this book is an essential reference that needs to be understood, digested, and aggressively addressed by IT and information security professionals everywhere." - Ken Cutler, CISSP, CISA Vice Presiden
Read Less
Add this copy of Exploiting Software: How to Break Code to cart. $2.31, good condition, Sold by The Maryland Book Bank rated 5.0 out of 5 stars, ships from baltimore, MD, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $2.34, fair condition, Sold by Orion Tech rated 5.0 out of 5 stars, ships from Arlington, TX, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $2.36, very good condition, Sold by ThriftBooks-Atlanta rated 5.0 out of 5 stars, ships from Austell, GA, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $2.36, very good condition, Sold by ThriftBooks-Baltimore rated 5.0 out of 5 stars, ships from Halethorpe, MD, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $2.36, good condition, Sold by ThriftBooks-Reno rated 5.0 out of 5 stars, ships from Reno, NV, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $2.36, good condition, Sold by ThriftBooks-Dallas rated 5.0 out of 5 stars, ships from Dallas, TX, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code (Addison-Wesley to cart. $2.52, good condition, Sold by BookHolders rated 5.0 out of 5 stars, ships from Gambrills, MD, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software: How to Break Code to cart. $2.65, good condition, Sold by Seattle Goodwill rated 4.0 out of 5 stars, ships from Seattle, WA, UNITED STATES, published 2004 by Addison-Wesley Professional.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
May have some shelf-wear due to normal use. Your purchase funds free job training and education in the greater Seattle area. Thank you for supporting Goodwill's nonprofit mission!
Add this copy of Exploiting Software: How to Break Code to cart. $3.87, fair condition, Sold by Goodwill Books rated 5.0 out of 5 stars, ships from Hillsboro, OR, UNITED STATES, published 2004 by Addison-Wesley Professional.
Add this copy of Exploiting Software How to Break Code to cart. $12.61, good condition, Sold by TextbookRush rated 5.0 out of 5 stars, ships from Grandview Hts, OH, UNITED STATES, published 2004 by Addison-Wesley Professional.