An Analysis of Software Security Attacks and Mitigation Controls: From an implementation point of view,Used

An Analysis of Software Security Attacks and Mitigation Controls: From an implementation point of view,Used

In Stock
SKU: DADAX3659309443
Brand: LAP Lambert Academic Publishing
Sale price$83.54 Regular price$119.34
Save $35.80
Quantity
Add to wishlist
Add to compare

Processing time: 1-3 days

US Orders Ships in: 3-5 days

International Orders Ships in: 8-12 days

Return Policy: 15-days return on defective items

Payment Option
Payment Methods

Help

If you have any questions, you are always welcome to contact us. We'll get back to you as soon as possible, withing 24 hours on weekdays.

Customer service

All questions about your order, return and delivery must be sent to our customer service team by e-mail at yourstore@yourdomain.com

Sale & Press

If you are interested in selling our products, need more information about our brand or wish to make a collaboration, please contact us at press@yourdomain.com

The security vulnerabilities hidden in software programs pose a major threat, on the computers and networks, when appropriately exploited by a malicious user. The vulnerabilities arise primarily due to the coding errors and/or flaws in the underlying platform. The book researches on the wellknown coding and platform vulnerabilities related to the security of software programs and the attacks they lead to. Specifically, the following software security attacks are analyzed in detail: SQL injection attacks, Crosssite scripting (XSS) attacks, Crosssite request forgery (XSRF) attacks, and the Timeofchecktotimeofuse (TOCTTOU) attacks. The book examines the vulnerabilities that lead to each of these attacks, illustrates realtime examples of implementing these attacks with stepbystep instructions, as well as explores the use of appropriate security controls to completely avoid or at least mitigate the attacks. In addition to analyzing the above attacks in detail, the book presents a highlevel overview of the following software security attacks: Linearization attacks, Arithmetic overflow attacks, Buffer overflow attacks, Stack smashing buffer overflow and Format string attacks.

⚠️ WARNING (California Proposition 65):

This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.

For more information, please visit www.P65Warnings.ca.gov.

Recently Viewed