Exploiting Software How To Break Code
This item shows signs of wear from consistent use, but it remains in good condition and works perfectly. All pages and cover are intact, but may have aesthetic issues such as small tears, bends, scratches, and scuffs. Spine may also show signs of wear. Pages may include some notes and highlighting. May include "From the library of" labels. Satisfaction Guaranteed.
Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software-a must-have title that may shock and educate readers.
Praise for Exploiting Software "Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day.