HOME > 상세정보

상세정보

The art of software security assessment : identifying and preventing software vulnerabilities

The art of software security assessment : identifying and preventing software vulnerabilities (2회 대출)

자료유형
단행본
개인저자
Dowd, Mark. McDonald, John 1977- Schuh, Justin.
서명 / 저자사항
The art of software security assessment : identifying and preventing software vulnerabilities / Mark Dowd, John McDonald, and Justin Schuh.
발행사항
Indianapolis, Ind. :   Addison-Wesley ,   2006.  
형태사항
1174 p. : ill. ; 24 cm.
ISBN
0321444426 (pbk. : alk. paper)
일반주제명
Computer security. Computer software -- Development. Computer networks -- Security measures.
000 00961camuu22002778a 4500
001 000045325060
005 20070130155918
008 060717s2006 inua 000 0 eng
010 ▼a 2006023446
020 ▼a 0321444426 (pbk. : alk. paper)
035 ▼a (KERIS)REF000012733984
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b D75 2006
082 0 0 ▼a 005.8 ▼2 22
090 ▼a 005.8 ▼b D745a
100 1 ▼a Dowd, Mark.
245 1 4 ▼a The art of software security assessment : ▼b identifying and preventing software vulnerabilities / ▼c Mark Dowd, John McDonald, and Justin Schuh.
260 ▼a Indianapolis, Ind. : ▼b Addison-Wesley , ▼c 2006.
300 ▼a 1174 p. : ▼b ill. ; ▼c 24 cm.
650 0 ▼a Computer security.
650 0 ▼a Computer software ▼x Development.
650 0 ▼a Computer networks ▼x Security measures.
700 1 ▼a McDonald, John ▼d 1977-
700 1 ▼a Schuh, Justin.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 D745a 등록번호 121139139 (2회 대출) 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

?Halvar Flake, CEO and head of research, SABRE Security GmbH

The Definitive Insider’s Guide to Auditing Software Security

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.

The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry's highest-profile applications.

Coverage includes

• Code auditing: theory, practice, proven methodologies, and secrets of the trade

• Bridging the gap between secure software design and post-implementation review

• Performing architectural assessment: design review, threat modeling, and operational review

• Identifying vulnerabilities related to memory management, data types, and malformed data

• UNIX/Linux assessment: privileges, files, and processes

• Windows-specific issues, including objects and the filesystem

• Auditing interprocess communication, synchronization, and state

• Evaluating network software: IP stacks, firewalls, and common application protocols

• Auditing Web applications and technologies

This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.

Contents

ABOUT THE AUTHORS xv

PREFACE xvii

ACKNOWLEDGMENTS xxi

I Introduction to Software Security Assessment

1 SOFTWARE VULNERABILITY FUNDAMENTALS 3

2 DESIGN REVIEW 25

3 OPERATIONAL REVIEW 67

4 APPLICATION REVIEW PROCESS 91

II Software Vulnerabilities

5 MEMORY CORRUPTION 167

6 C LANGUAGE ISSUES 203

7 PROGRAM BUILDING BLOCKS 297

8 STRINGS ANDMETACHARACTERS 387

9 UNIX I: PRIVILEGES AND FILES 459

10 UNIX II: PROCESSES 559

11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625

12 WINDOWS II: INTERPROCESS COMMUNICATION 685

13 SYNCHRONIZATION AND STATE 755

III Software Vulnerabilities in Practice

14 NETWORK PROTOCOLS 829

15 FIREWALLS 891

16 NETWORK APPLICATION PROTOCOLS 921

17 WEB APPLICATIONS 1007

18 WEB TECHNOLOGIES 1083

BIBLIOGRAPHY 1125

INDEX 1129


정보제공 : Aladin

저자소개

Mark Dowd(지은이)

맥아피(McAfee)의 수석 보안 아키텍트로 근무하고 있으며, 애플리케이션 보안 분야에서 다년간의 경험을 갖고 있다. 인터넷 보안 시스템(ISS)인 엑스포스(X-Force)에서 다년간 수석 연구가로 근무한 경험을 기반으로 유비쿼터스 인터넷 소프트웨어 분야에서 수많은 취약점을 발견했으며, 마이크로소프트의 익스체인지 서버 같은 메일 전송 서비스, OpenSSH, 파이어폭스의 모질라 같은 인터넷 브라우저, VPN, 마이크로소프트의 SSL 같은 분야에서 주소 체계 등의 심각한 문제점을 찾거나 식별하는 데 탁월한 능력을 보여준다. 그의 연구는 산업계의 유명 컨퍼런스인 블랙햇이나 럭스콘(RUXCON)의 주제를 포괄하고 있다.

Justin Schuh(지은이)

애플리케이션 보안 점검을 수행하는 네오햅시스의 상급 컨설턴트이자 점검 리더로서 이식된 장치의 펌웨어부터 배포되는 기업 웹 애플리케이션까지 시스템의 다양한 범위에 걸쳐 보안 평가를 수행하고 있다. 네오햅시스에 들어가기 전에는 미국 국방부 및 관련 업체의 컴퓨터 보안 분야에서 10년 동안 근무했다. 대정부서비스를 할 때에는 미국 국가안전보장국(National Security Agency)의 침투 테스트 팀(Red Team)의 수석 선임 연구원의 역할을 했다.

정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)