From Book News, Inc.
Intended for software testers, this guide presents testing techniques that expose security holes caused by software dependencies, data- dependent weaknesses in software, application design flaws, and implementation-related vulnerabilities. The last chapter applies the techniques to Windows media player 9.0, Mozilla web browser 1.2.1, and OpenOffice.org 1.0.2 (Linux). The CD-ROM contains two testing tools written at the Florida Institute of Technology.Copyright © 2004 Book News, Inc., Portland, OR
How to Break Software Security: Effective Techniques for Security Testing SYNOPSIS
Intended for software testers, this guide presents testing techniques that expose security holes caused by software dependencies, data-dependent weaknesses in software, application design flaws, and implementation-related vulnerabilities. The last chapter applies the techniques to Windows media player 9.0, Mozilla web browser 1.2.1, and OpenOffice.org 1.0.2 (Linux). The CD-ROM contains two testing tools written at the Florida Institute of Technology. Annotation ©2004 Book News, Inc., Portland, OR