Exploiting Software How to Break Code

, by ;
Exploiting Software How to Break Code by Hoglund, Greg; McGraw, Gary R., 9780201786958
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
  • ISBN: 9780201786958 | 0201786958
  • Cover: Paperback
  • Copyright: 2/17/2004

  • Buy Used

    Usually Ships in 2-4 Business Days

    $47.77
  • Buy New

    This is a hard-to-find title. We are making every effort to obtain this item, but do not guarantee stock.

    $62.41

Praise for "Exploiting Software ""Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design--a key change from where we are today!" --Tony Scott Chief Technology Officer, IS&S General Motors Corporation "It's about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures,books like,"Exploiting Software have a critical role to play." --Bruce Schneier Chief Technology Officer Counterpane Author of "Beyond Fear and Secrets and Lies ""Exploiting Software cuts to the heart of the computer security problem, showing why broken software presents a clear and present danger. Getting past the 'worm of the day' phenomenon requires that someone other than the bad guys understands how software is attacked. This book is a wake-up call for computer security." --Elinor Mills Abreu Reuters' correspondent "Police investigators study how criminals think and act. Military strategists learn about the enemy's tactics, as well as their weapons andpersonnel capabilities. Similarly, information security professionals need to study their criminals and enemies, so we can tell the difference between popguns and weapons of mass destruction. This book is a significant advance in
Loading Icon

Please wait while the item is added to your bag...
Continue Shopping Button
Checkout Button
Loading Icon
Continue Shopping Button