000 | a | ||
---|---|---|---|
999 |
_c29324 _d29324 |
||
008 | 220831b xxu||||| |||| 00| 0 eng d | ||
020 | _a9781608078509 | ||
082 |
_a005.8 _bTAK |
||
100 | _aTakanen, Ari | ||
245 |
_aFuzzing for software security testing and quality assurance _b2nd ed. |
||
260 |
_bArtech House, _c2018 _aBoston : |
||
300 |
_axxv, 318 p. ; _bill., _c25 cm |
||
365 |
_b129.00 _cGBP _d99.60 |
||
490 | _aArtech House information security and privacy series | ||
504 | _aIncludes bibliographical references and index. | ||
520 | _aThis comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools. | ||
650 | _aComputer security general | ||
650 | _aComputer networks security measures | ||
650 | _aComputer software development | ||
650 | _aElectronic books | ||
650 | _aAttack surfaces | ||
650 | _aBlock-box testing | ||
650 | _aBuffer overflow | ||
650 | _a Bug hunting technique | ||
650 | _a Code auditing | ||
650 | _a Denial of services (DOS) attack | ||
650 | _a Evolutionary Fuzzing system (EFS) | ||
650 | _a Fuzzers | ||
650 | _aMemory corruption | ||
650 | _aNegative testing | ||
650 | _a ProxyFuzz | ||
650 | _a Regression testing | ||
650 | _aRobustness testing | ||
650 | _aSNMP | ||
650 | _aSource code auditing | ||
650 | _a Test automation | ||
650 | _aV-model | ||
650 | _aValgrind | ||
650 | _aHashing | ||
700 | _aDeMott, Jared | ||
700 | _aMiller, Charlie | ||
700 | _aKettunen, Atte | ||
942 |
_2ddc _cBK |