Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software--a must-have title that may shock and educate readers.
Read More
Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software--a must-have title that may shock and educate readers.
Read Less
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Good. All pages and cover are intact. Possible slightly loose binding, minor highlighting and marginalia, cocked spine or torn dust jacket. Maybe an ex-library copy and not include the accompanying CDs, access codes or other supplemental materials.
Choose your shipping method in Checkout. Costs may vary based on destination.
Seller's Description:
Very Good. Trade paperback (US). Glued binding. 512 p. Addison-Wesley Software Security. Using attack patterns, real code, and example exploits, students learn techniques that are used by real malicious hackers against software. The author team show to break code-if students want to protect software from attack, they must first learn how real attacks are really carried out.