Flylib.com
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Table of Contents
Copyright
About the Authors
Preface
Acknowledgments
Part I: Introduction to Software Security Assessment
Chapter 1. Software Vulnerability Fundamentals
Introduction
Vulnerabilities
The Necessity of Auditing
Classifying Vulnerabilities
Common Threads
Summary
Chapter 2. Design Review
Introduction
Software Design Fundamentals
Enforcing Security Policy
Threat Modeling
Summary
Chapter 3. Operational Review
Introduction
Exposure
Web-Specific Considerations
Protective Measures
Summary
Chapter 4. Application Review Process
Introduction
Overview of the Application Review Process
Preassessment
Application Review
Documentation and Analysis
Reporting and Remediation Support
Code Navigation
Code-Auditing Strategies
Code-Auditing Tactics
Code Auditor s Toolbox
Case Study: OpenSSH
Summary
Part II: Software Vulnerabilities
Chapter 5. Memory Corruption
Introduction
Buffer Overflows
Shellcode
Protection Mechanisms
Assessing Memory Corruption Impact
Summary
Chapter 6. C Language Issues
Introduction
C Language Background
Data Storage Overview
Arithmetic Boundary Conditions
Type Conversions
Type Conversion Vulnerabilities
Operators
Pointer Arithmetic
Other C Nuances
Summary
Chapter 7. Program Building Blocks
Introduction
Auditing Variable Use
Auditing Control Flow
Auditing Functions
Auditing Memory Management
Summary
Chapter 8. Strings and Metacharacters
Introduction
C String Handling
Metacharacters
Common Metacharacter Formats
Metacharacter Filtering
Character Sets and Unicode
Summary
Chapter 9. UNIX I: Privileges and Files
Introduction
UNIX 101
Privilege Model
Privilege Vulnerabilities
File Security
File Internals
Links
Race Conditions
Temporary Files
The Stdio File Interface
Summary
Chapter 10. UNIX II: Processes
Introduction
Processes
Program Invocation
Process Attributes
Interprocess Communication
Remote Procedure Calls
Summary
Chapter 11. Windows I: Objects and the File System
Introduction
Background
Objects
Sessions
Security Descriptors
Processes and Threads
File Access
The Registry
Summary
Chapter 12. Windows II: Interprocess Communication
Introduction
Windows IPC Security
Window Messaging
Pipes
Mailslots
Remote Procedure Calls
COM
Summary
Chapter 13. Synchronization and State
Introduction
Synchronization Problems
Process Synchronization
Signals
Threads
Summary
Part III: Software Vulnerabilities in Practice
Chapter 14. Network Protocols
Introduction
Internet Protocol
User Datagram Protocol
Transmission Control Protocol
Summary
Chapter 15. Firewalls
Introduction
Overview of Firewalls
Stateless Firewalls
Simple Stateful Firewalls
Stateful Inspection Firewalls
Spoofing Attacks
Summary
Chapter 16. Network Application Protocols
Introduction
Auditing Application Protocols
Hypertext Transfer Protocol
Internet Security Association and Key Management Protocol
Abstract Syntax Notation (ASN.1)
Domain Name System
Summary
Chapter 17. Web Applications
Introduction
Web Technology Overview
HTTP
State and HTTP Authentication
Architecture
Problem Areas
Common Vulnerabilities
Harsh Realities of the Web
Auditing Strategy
Summary
Chapter 18. Web Technologies
Introduction
Web Services and Service-Oriented Architecture
Web Application Platforms
CGI
Perl
PHP
Java
ASP
ASP.NET
Summary
Bibliography
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
Java How to Program (6th Edition) (How to Program (Deitel))
(Optional) Software Engineering Case Study: Identifying Class Attributes
JButton
Class File
Relational Databases
Printing Floating-Point Numbers
Introduction to 80x86 Assembly Language and Computer Architecture
Elements of Assembly Language
Procedures
Bit Manipulation
Floating-Point Arithmetic
Appendix C MASM 6.11 Reserved Words
MySQL Cookbook
Issuing Queries
WHERE Clauses and Column Aliases
Synthesizing Dates or Times Using Formatting Functions
Sorting Expression Results
Dont Assume LOAD DATA Knows More than It Does
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
Partial Page Rendering
Remote Method Calls with ASP.NET AJAX
Sap Bw: a Step By Step Guide for Bw 2.0
Summary
Managing User Authorization
Transferring R/3 Global Settings
Maintaining InfoCube Data
Tuning Query Performance
DNS & BIND Cookbook
Getting BIND
Running a Name Server on an Alternate Port
Migrating from One Domain Name to Another
Preventing a Name Server from Responding to DNS Traffic from Certain Networks
Handling Windows Registration with a BIND Name Server
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies