Fuzzing: brute force vulnerabilty discovery
"Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing met...
Gespeichert in:
Beteilige Person: | |
---|---|
Weitere beteiligte Personen: | , |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Upper Saddle River, N.J.
Addison-Wesley
2007
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780321446114/?ar |
Zusammenfassung: | "Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work."--Jacket |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
ISBN: | 9780321446114 0321446119 0321525019 9780321525017 9781282680968 128268096X 9788131747797 8131747794 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047465336 | ||
003 | DE-627-1 | ||
005 | 20240228114127.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2007 xx |||||o 00| ||eng c | ||
020 | |a 9780321446114 |9 978-0-321-44611-4 | ||
020 | |a 0321446119 |9 0-321-44611-9 | ||
020 | |a 0321525019 |9 0-321-52501-9 | ||
020 | |a 9780321525017 |9 978-0-321-52501-7 | ||
020 | |a 9781282680968 |c online |9 978-1-282-68096-8 | ||
020 | |a 128268096X |9 1-282-68096-X | ||
020 | |a 9788131747797 |c online |9 978-81-317-4779-7 | ||
020 | |a 8131747794 |9 81-317-4779-4 | ||
035 | |a (DE-627-1)047465336 | ||
035 | |a (DE-599)KEP047465336 | ||
035 | |a (ORHE)9780321446114 | ||
035 | |a (DE-627-1)047465336 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |2 rvk | ||
084 | |a ST 277 |2 rvk | ||
100 | 1 | |a Sutton, Michael |d 1973- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Fuzzing |b brute force vulnerabilty discovery |c Michael Sutton, Adam Greene, Pedram Amini |
264 | 1 | |a Upper Saddle River, N.J. |b Addison-Wesley |c 2007 | |
264 | 2 | |a [Place of publication not identified] |b HathiTrust Digital Library | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
506 | |f Restrictions unspecified |2 star | ||
520 | |a "Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work."--Jacket | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. | ||
546 | |a English. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Computer software |x Development | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer software ; Development | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer software ; Development | |
650 | 4 | |a Computersicherheit | |
650 | 4 | |a Datensicherung | |
650 | 4 | |a Rechnernetz | |
650 | 4 | |a Intrusion Detection | |
700 | 1 | |a Greene, Adam |d 1983- |e MitwirkendeR |4 ctb | |
700 | 1 | |a Amini, Pedram |e MitwirkendeR |4 ctb | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780321446114/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
936 | r | v | |a ST 276 |
936 | r | v | |a ST 277 |
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047465336 |
---|---|
_version_ | 1821494900163608576 |
adam_text | |
any_adam_object | |
author | Sutton, Michael 1973- |
author2 | Greene, Adam 1983- Amini, Pedram |
author2_role | ctb ctb |
author2_variant | a g ag p a pa |
author_facet | Sutton, Michael 1973- Greene, Adam 1983- Amini, Pedram |
author_role | aut |
author_sort | Sutton, Michael 1973- |
author_variant | m s ms |
building | Verbundindex |
bvnumber | localTUM |
classification_rvk | ST 276 ST 277 |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047465336 (DE-599)KEP047465336 (ORHE)9780321446114 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03243cam a22007212 4500</leader><controlfield tag="001">ZDB-30-ORH-047465336</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114127.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2007 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321446114</subfield><subfield code="9">978-0-321-44611-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321446119</subfield><subfield code="9">0-321-44611-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0321525019</subfield><subfield code="9">0-321-52501-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780321525017</subfield><subfield code="9">978-0-321-52501-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282680968</subfield><subfield code="c">online</subfield><subfield code="9">978-1-282-68096-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">128268096X</subfield><subfield code="9">1-282-68096-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788131747797</subfield><subfield code="c">online</subfield><subfield code="9">978-81-317-4779-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8131747794</subfield><subfield code="9">81-317-4779-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047465336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047465336</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780321446114</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047465336</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sutton, Michael</subfield><subfield code="d">1973-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fuzzing</subfield><subfield code="b">brute force vulnerabilty discovery</subfield><subfield code="c">Michael Sutton, Adam Greene, Pedram Amini</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Upper Saddle River, N.J.</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">2007</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">HathiTrust Digital Library</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work."--Jacket</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer software ; Development</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computersicherheit</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Datensicherung</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Rechnernetz</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intrusion Detection</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Greene, Adam</subfield><subfield code="d">1983-</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Amini, Pedram</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780321446114/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 276</subfield></datafield><datafield tag="936" ind1="r" ind2="v"><subfield code="a">ST 277</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047465336 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:21:43Z |
institution | BVB |
isbn | 9780321446114 0321446119 0321525019 9780321525017 9781282680968 128268096X 9788131747797 8131747794 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Sutton, Michael 1973- VerfasserIn aut Fuzzing brute force vulnerabilty discovery Michael Sutton, Adam Greene, Pedram Amini Upper Saddle River, N.J. Addison-Wesley 2007 [Place of publication not identified] HathiTrust Digital Library 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Restrictions unspecified star "Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work."--Jacket Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. English. Computer security Computer networks Security measures Computer software Development Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer software ; Development Computersicherheit Datensicherung Rechnernetz Intrusion Detection Greene, Adam 1983- MitwirkendeR ctb Amini, Pedram MitwirkendeR ctb |
spellingShingle | Sutton, Michael 1973- Fuzzing brute force vulnerabilty discovery Computer security Computer networks Security measures Computer software Development Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer software ; Development Computersicherheit Datensicherung Rechnernetz Intrusion Detection |
title | Fuzzing brute force vulnerabilty discovery |
title_auth | Fuzzing brute force vulnerabilty discovery |
title_exact_search | Fuzzing brute force vulnerabilty discovery |
title_full | Fuzzing brute force vulnerabilty discovery Michael Sutton, Adam Greene, Pedram Amini |
title_fullStr | Fuzzing brute force vulnerabilty discovery Michael Sutton, Adam Greene, Pedram Amini |
title_full_unstemmed | Fuzzing brute force vulnerabilty discovery Michael Sutton, Adam Greene, Pedram Amini |
title_short | Fuzzing |
title_sort | fuzzing brute force vulnerabilty discovery |
title_sub | brute force vulnerabilty discovery |
topic | Computer security Computer networks Security measures Computer software Development Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer software ; Development Computersicherheit Datensicherung Rechnernetz Intrusion Detection |
topic_facet | Computer security Computer networks Security measures Computer software Development Sécurité informatique Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures Computer software ; Development Computersicherheit Datensicherung Rechnernetz Intrusion Detection |
work_keys_str_mv | AT suttonmichael fuzzingbruteforcevulnerabiltydiscovery AT greeneadam fuzzingbruteforcevulnerabiltydiscovery AT aminipedram fuzzingbruteforcevulnerabiltydiscovery |