Fuzzing: Brute Force Vulnerabiltiy Discovery
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Pearson International
2007
|
Ausgabe: | 1st Edition |
Schlagwörter: | |
Links: | https://elibrary.pearson.de/book/99.150005/9780321525017 https://elibrary.pearson.de/book/99.150005/9780321525017 |
Abstract: | "FUZZING - Master One of Today's Most Powerful Techniques for Revealing Security Flaws! Fuzzing has evolved into one of today's most effective approaches to test software security. To "fuzz," you attach a program's inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it's your turn. In this book, renowned fuzzing experts show you how to use fuzzing to reveal weaknesses in your software before someone else does. Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work. |
Umfang: | 1 Online-Ressource |
ISBN: | 9780321525017 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV048975280 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 230526s2007 xx o|||| 00||| eng d | ||
020 | |a 9780321525017 |c ebook |9 978-0-321-52501-7 | ||
035 | |a (ZDB-150-PEB)089730011 | ||
035 | |a (OCoLC)1381309960 | ||
035 | |a (DE-599)KEP089730011 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Sutton, Michael |e Verfasser |4 aut | |
245 | 1 | 0 | |a Fuzzing |b Brute Force Vulnerabiltiy Discovery |
250 | |a 1st Edition | ||
264 | 1 | |a Boston |b Pearson International |c 2007 | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a "FUZZING - Master One of Today's Most Powerful Techniques for Revealing Security Flaws! Fuzzing has evolved into one of today's most effective approaches to test software security. To "fuzz," you attach a program's inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it's your turn. In this book, renowned fuzzing experts show you how to use fuzzing to reveal weaknesses in your software before someone else does. Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work. | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
653 | |a Employability | ||
653 | |a IT Professional | ||
653 | |a Professional | ||
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Amini, Pedram |e Sonstige |4 oth | |
700 | 1 | |a Greene, Adam |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780321446114 |
856 | 4 | 0 | |u https://elibrary.pearson.de/book/99.150005/9780321525017 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-150-PEB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034238831 | |
966 | e | |u https://elibrary.pearson.de/book/99.150005/9780321525017 |l DE-83 |p ZDB-150-PEB |q TUB_EBS_Pearson |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1818990630306578432 |
---|---|
any_adam_object | |
author | Sutton, Michael |
author_facet | Sutton, Michael |
author_role | aut |
author_sort | Sutton, Michael |
author_variant | m s ms |
building | Verbundindex |
bvnumber | BV048975280 |
classification_rvk | ST 276 ST 277 |
collection | ZDB-150-PEB |
ctrlnum | (ZDB-150-PEB)089730011 (OCoLC)1381309960 (DE-599)KEP089730011 |
discipline | Informatik |
edition | 1st Edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02882nam a22005171c 4500</leader><controlfield tag="001">BV048975280</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">230526s2007 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321525017</subfield><subfield code="c">ebook</subfield><subfield code="9">978-0-321-52501-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-150-PEB)089730011</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1381309960</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP089730011</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sutton, Michael</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fuzzing</subfield><subfield code="b">Brute Force Vulnerabiltiy Discovery</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st Edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Pearson International</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"FUZZING - Master One of Today's Most Powerful Techniques for Revealing Security Flaws! Fuzzing has evolved into one of today's most effective approaches to test software security. To "fuzz," you attach a program's inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it's your turn. In this book, renowned fuzzing experts show you how to use fuzzing to reveal weaknesses in your software before someone else does. Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Employability</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">IT Professional</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Professional</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Amini, Pedram</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Greene, Adam</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780321446114</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://elibrary.pearson.de/book/99.150005/9780321525017</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-150-PEB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034238831</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://elibrary.pearson.de/book/99.150005/9780321525017</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-150-PEB</subfield><subfield code="q">TUB_EBS_Pearson</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV048975280 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T19:57:25Z |
institution | BVB |
isbn | 9780321525017 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034238831 |
oclc_num | 1381309960 |
open_access_boolean | |
owner | DE-83 |
owner_facet | DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-150-PEB ZDB-150-PEB TUB_EBS_Pearson |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Pearson International |
record_format | marc |
spelling | Sutton, Michael Verfasser aut Fuzzing Brute Force Vulnerabiltiy Discovery 1st Edition Boston Pearson International 2007 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier "FUZZING - Master One of Today's Most Powerful Techniques for Revealing Security Flaws! Fuzzing has evolved into one of today's most effective approaches to test software security. To "fuzz," you attach a program's inputs to a source of random data, and then systematically identify the failures that arise. Hackers have relied on fuzzing for years: Now, it's your turn. In this book, renowned fuzzing experts show you how to use fuzzing to reveal weaknesses in your software before someone else does. Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work. Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Employability IT Professional Professional Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s DE-604 Computersicherheit (DE-588)4274324-2 s Amini, Pedram Sonstige oth Greene, Adam Sonstige oth Erscheint auch als Druck-Ausgabe 9780321446114 https://elibrary.pearson.de/book/99.150005/9780321525017 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Sutton, Michael Fuzzing Brute Force Vulnerabiltiy Discovery Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4070085-9 |
title | Fuzzing Brute Force Vulnerabiltiy Discovery |
title_auth | Fuzzing Brute Force Vulnerabiltiy Discovery |
title_exact_search | Fuzzing Brute Force Vulnerabiltiy Discovery |
title_full | Fuzzing Brute Force Vulnerabiltiy Discovery |
title_fullStr | Fuzzing Brute Force Vulnerabiltiy Discovery |
title_full_unstemmed | Fuzzing Brute Force Vulnerabiltiy Discovery |
title_short | Fuzzing |
title_sort | fuzzing brute force vulnerabiltiy discovery |
title_sub | Brute Force Vulnerabiltiy Discovery |
topic | Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Rechnernetz (DE-588)4070085-9 gnd |
topic_facet | Computersicherheit Datensicherung Rechnernetz |
url | https://elibrary.pearson.de/book/99.150005/9780321525017 |
work_keys_str_mv | AT suttonmichael fuzzingbruteforcevulnerabiltiydiscovery AT aminipedram fuzzingbruteforcevulnerabiltiydiscovery AT greeneadam fuzzingbruteforcevulnerabiltiydiscovery |