CDN$ 54.09
  • List Price: CDN$ 56.95
  • You Save: CDN$ 2.86 (5%)
Only 1 left in stock.
Ships from and sold by Amazon.ca.
Gift-wrap available.
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Software Vulnerability Guide Paperback – Jun 3 2005


See all 2 formats and editions Hide other formats and editions
Amazon Price New from Used from
Paperback
"Please retry"
CDN$ 54.09
CDN$ 49.44 CDN$ 5.56

2014 Books Gift Guide
Yes Please is featured in our 2014 Books Gift Guide. More gift ideas


Product Details


Product Description

About the Author

Herbert Thompson (Melbourne Beach, FL) is the Director of Security Technology at Security Innovation LLC. He holds a Ph.D. in Applied Mathematics from the Florida Institute of Technology and is CISSP, CCNA, and MCP certified. Scott Chase (Melbourne, FL) is the Director of Security Testing for Security Innovation LLC, where he manages a team of professional security testers and develops testing methodologies and tools.

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on Amazon.com (beta)

Amazon.com: 6 reviews
14 of 14 people found the following review helpful
Very concise and helpful Dec 15 2005
By C. Madden - Published on Amazon.com
Format: Paperback Verified Purchase
I've maybe read three or four books on the subject of software security and this is the best so far. Very concise and well organized and covers just about every facet of software vulnerabilities that I've ever heard of. Very helpful too because at the end of each chapter it gives detailed advice on how to avoid the vulnerability that they discussed. Also, the CD comes with some nice tools and source code. I definitely learned a lot from this book and highly recommend it to both web application and desktop application developers.
11 of 11 people found the following review helpful
Microsoft MVP 2005 - Visual C# gives this a big thumbs up! July 20 2005
By Robbe D. Morris - Published on Amazon.com
Format: Paperback
If you consider yourself a solid developer but know you probably don't give the security of your software/databases as much attention as you should, then you need to get your hands on The Software Vulnerability Guide.

Unlike a lot of other security books, this one isn't full of a bunch of vagure generalities. It gives you solid details on some of the most common (and perhaps some less common) holes that exist in the software you just released. The information contained in each useful chapter is easily digestable by beginners.

Buy the book and spare yourself the embarrassment from some twenty something who stole some script off the web and deleted all the data in your intranet application.
[...]
2 of 2 people found the following review helpful
Recommended if you care about Quality Software Feb. 10 2010
By P. Manno - Published on Amazon.com
Format: Paperback Verified Purchase
Unsecure software is always poorly written/low quality software. This book will help you identify problems and provide the insight necessary to write higher quality code.
2 of 3 people found the following review helpful
Excellent resource for software developers May 30 2006
By Ben Rothke - Published on Amazon.com
Format: Paperback
Every month, hundreds of security vulnerabilities and warnings are announced. Although they cover a wide set of products and programs, the underlying reason for them is generally the same: insecurely written software. When software is written in insecure code (which includes most software programs written today), serious security flaws are inevitable.

The Software Vulnerability Guide was written to help software developers acquire the methods necessary to write secure code and find existing problems in current software. After making a persuasive case for secure code in part one, the book progresses into the areas that are crucial to writing secure software.

Part two of the book covers system-level attacks and details important topics such as passwords, scripts and macros, and dynamic linking and loading (DLL). Part three plunges into attacks on the software, exploring heady concepts such as buffer overflows, format-string vulnerabilities, and integer overflow vulnerabilities. Most of these attacks have been known for decades but are only receiving wide-scale attention now.

Further chapters delve into securing data and Web servers. For each of the vulnerabilities mentioned, the authors describe how they occur and how to prevent them.

An enclosed CD-ROM contains software examples described in the text, plus various open-source security software testing tools, including Ethereal, Nessus, and Nmap. Any business serious about writing secure software should ensure that all of its code writers receive a copy of this book
2 of 4 people found the following review helpful
A guide which includes a CD-ROM with source code and many tools described within Oct. 3 2005
By Midwest Book Review - Published on Amazon.com
Format: Paperback
Herbert H. Thompson and Scott G. Chase's Software Vulnerability Guide comes from a security director and a security architect, drawing upon their combined expertise to consider techniques developers need to use to produce secure code in modern software. Developers and testers receive both tools and assessments of tools designed to help recognize and prevent common vulnerabilties in source code. Commentary and code examples pack a guide which includes a CD-ROM with source code and many tools described within.


Feedback