Flylib.com
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Table of Contents
Copyright
About the Authors
Preface
Acknowledgments
Part I: Introduction to Software Security Assessment
Chapter 1. Software Vulnerability Fundamentals
Introduction
Vulnerabilities
The Necessity of Auditing
Classifying Vulnerabilities
Common Threads
Summary
Chapter 2. Design Review
Introduction
Software Design Fundamentals
Enforcing Security Policy
Threat Modeling
Summary
Chapter 3. Operational Review
Introduction
Exposure
Web-Specific Considerations
Protective Measures
Summary
Chapter 4. Application Review Process
Introduction
Overview of the Application Review Process
Preassessment
Application Review
Documentation and Analysis
Reporting and Remediation Support
Code Navigation
Code-Auditing Strategies
Code-Auditing Tactics
Code Auditor s Toolbox
Case Study: OpenSSH
Summary
Part II: Software Vulnerabilities
Chapter 5. Memory Corruption
Introduction
Buffer Overflows
Shellcode
Protection Mechanisms
Assessing Memory Corruption Impact
Summary
Chapter 6. C Language Issues
Introduction
C Language Background
Data Storage Overview
Arithmetic Boundary Conditions
Type Conversions
Type Conversion Vulnerabilities
Operators
Pointer Arithmetic
Other C Nuances
Summary
Chapter 7. Program Building Blocks
Introduction
Auditing Variable Use
Auditing Control Flow
Auditing Functions
Auditing Memory Management
Summary
Chapter 8. Strings and Metacharacters
Introduction
C String Handling
Metacharacters
Common Metacharacter Formats
Metacharacter Filtering
Character Sets and Unicode
Summary
Chapter 9. UNIX I: Privileges and Files
Introduction
UNIX 101
Privilege Model
Privilege Vulnerabilities
File Security
File Internals
Links
Race Conditions
Temporary Files
The Stdio File Interface
Summary
Chapter 10. UNIX II: Processes
Introduction
Processes
Program Invocation
Process Attributes
Interprocess Communication
Remote Procedure Calls
Summary
Chapter 11. Windows I: Objects and the File System
Introduction
Background
Objects
Sessions
Security Descriptors
Processes and Threads
File Access
The Registry
Summary
Chapter 12. Windows II: Interprocess Communication
Introduction
Windows IPC Security
Window Messaging
Pipes
Mailslots
Remote Procedure Calls
COM
Summary
Chapter 13. Synchronization and State
Introduction
Synchronization Problems
Process Synchronization
Signals
Threads
Summary
Part III: Software Vulnerabilities in Practice
Chapter 14. Network Protocols
Introduction
Internet Protocol
User Datagram Protocol
Transmission Control Protocol
Summary
Chapter 15. Firewalls
Introduction
Overview of Firewalls
Stateless Firewalls
Simple Stateful Firewalls
Stateful Inspection Firewalls
Spoofing Attacks
Summary
Chapter 16. Network Application Protocols
Introduction
Auditing Application Protocols
Hypertext Transfer Protocol
Internet Security Association and Key Management Protocol
Abstract Syntax Notation (ASN.1)
Domain Name System
Summary
Chapter 17. Web Applications
Introduction
Web Technology Overview
HTTP
State and HTTP Authentication
Architecture
Problem Areas
Common Vulnerabilities
Harsh Realities of the Web
Auditing Strategy
Summary
Chapter 18. Web Technologies
Introduction
Web Services and Service-Oriented Architecture
Web Application Platforms
CGI
Perl
PHP
Java
ASP
ASP.NET
Summary
Bibliography
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
Security and the Employee (Social Engineering)
Level III Assessments
Ranking Your Findings
Statement of Work
Visual C# 2005 How to Program (2nd Edition)
Web Resources
(Optional) Software Engineering Case Study: Examining the ATM Requirements Document
Terminology
XML Basics
Self-Review Exercises
Competency-Based Human Resource Management
Competency-Based Employee Recruitment and Selection
Competency-Based Performance Management
Competency-Based Employee Rewards
Competency-Based Employee Development
The Transformation to Competency-Based HR Management
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Designing and Installing a Home Telephone System
Troubleshooting a Home Communication System
Designing a Home Security System
Troubleshooting and Maintaining a Home Security System
Home Access Control Systems
Programming .Net Windows Applications
DialogResult
Creating a User Control
Updating Data with Transactions
Multiuser Updates
Command Builder
DNS & BIND Cookbook
Creating a named.conf File
Adding a Host
Using rndc with a Remote Name Server
Limiting Concurrent TCP Clients
Concealing a Name Servers Version
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies