Vous voulez voir cette page en français ? Cliquez ici.

Sign in to turn on 1-Click ordering.
Amazon Prime Free Trial required. Sign up when you check out. Learn More
More Buying Choices
Have one to sell? Sell yours here
Tell the Publisher!
I'd like to read this book on Kindle

Don't have a Kindle? Get your Kindle here, or download a FREE Kindle Reading App.

Software Vulnerability Guide [Paperback]

Herbert H Thompson , Scott G Chase

Price: CDN$ 56.95 & FREE Shipping. Details
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
Only 1 left in stock.
Ships from and sold by Amazon.ca. Gift-wrap available.
Want it delivered Wednesday, October 22? Choose One-Day Shipping at checkout.


Amazon Price New from Used from
Paperback CDN $17.88  
Paperback, June 3 2005 CDN $56.95  
Join Amazon Student in Canada

Book Description

June 3 2005 1584503580 978-1584503583 1
In today's market, secure software is a must for consumers. Many developers, however, are not familiar with the techniques needed to produce secure code or detect existing vulnerabilities. The Software Vulnerability Guide helps developers and testers better understand the underlying security flaws in software and provides an easy-to-use reference for security bugs. Most of these bugs (and the viruses, worms, and exploits that derive from them) start out as programmer mistakes. With this guide, professional programmers and testers will learn how to find, fix, and prevent these vulnerabilities before their software reaches the market. Detailed explanations and examples are provided for each of the vulnerabilities, as well as a summary sheet that can be referenced quickly. Tools that make it easier to recognize and prevent vulnerabilities are also explored, and source code snippets, commentary, and techniques are provided in easy-to-read sidebars. This guide is a must have for today's software developers.

Special Offers and Product Promotions

  • Join Amazon Student in Canada

Product Details

Product Description

About the Author

Herbert Thompson (Melbourne Beach, FL) is the Director of Security Technology at Security Innovation LLC. He holds a Ph.D. in Applied Mathematics from the Florida Institute of Technology and is CISSP, CCNA, and MCP certified. Scott Chase (Melbourne, FL) is the Director of Security Testing for Security Innovation LLC, where he manages a team of professional security testers and develops testing methodologies and tools.

Sell a Digital Version of This Book in the Kindle Store

If you are a publisher or author and hold the digital rights to a book, you can sell a digital version of it in our Kindle Store. Learn more

Customer Reviews

There are no customer reviews yet on Amazon.ca
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on Amazon.com (beta)
Amazon.com: 5.0 out of 5 stars  6 reviews
14 of 14 people found the following review helpful
5.0 out of 5 stars Very concise and helpful Dec 15 2005
By C. Madden - Published on Amazon.com
Format:Paperback|Verified Purchase
I've maybe read three or four books on the subject of software security and this is the best so far. Very concise and well organized and covers just about every facet of software vulnerabilities that I've ever heard of. Very helpful too because at the end of each chapter it gives detailed advice on how to avoid the vulnerability that they discussed. Also, the CD comes with some nice tools and source code. I definitely learned a lot from this book and highly recommend it to both web application and desktop application developers.
11 of 11 people found the following review helpful
5.0 out of 5 stars Microsoft MVP 2005 - Visual C# gives this a big thumbs up! July 20 2005
By Robbe D. Morris - Published on Amazon.com
If you consider yourself a solid developer but know you probably don't give the security of your software/databases as much attention as you should, then you need to get your hands on The Software Vulnerability Guide.

Unlike a lot of other security books, this one isn't full of a bunch of vagure generalities. It gives you solid details on some of the most common (and perhaps some less common) holes that exist in the software you just released. The information contained in each useful chapter is easily digestable by beginners.

Buy the book and spare yourself the embarrassment from some twenty something who stole some script off the web and deleted all the data in your intranet application.
2 of 2 people found the following review helpful
5.0 out of 5 stars Recommended if you care about Quality Software Feb. 10 2010
By P. Manno - Published on Amazon.com
Format:Paperback|Verified Purchase
Unsecure software is always poorly written/low quality software. This book will help you identify problems and provide the insight necessary to write higher quality code.
2 of 3 people found the following review helpful
5.0 out of 5 stars Excellent resource for software developers May 30 2006
By Ben Rothke - Published on Amazon.com
Every month, hundreds of security vulnerabilities and warnings are announced. Although they cover a wide set of products and programs, the underlying reason for them is generally the same: insecurely written software. When software is written in insecure code (which includes most software programs written today), serious security flaws are inevitable.

The Software Vulnerability Guide was written to help software developers acquire the methods necessary to write secure code and find existing problems in current software. After making a persuasive case for secure code in part one, the book progresses into the areas that are crucial to writing secure software.

Part two of the book covers system-level attacks and details important topics such as passwords, scripts and macros, and dynamic linking and loading (DLL). Part three plunges into attacks on the software, exploring heady concepts such as buffer overflows, format-string vulnerabilities, and integer overflow vulnerabilities. Most of these attacks have been known for decades but are only receiving wide-scale attention now.

Further chapters delve into securing data and Web servers. For each of the vulnerabilities mentioned, the authors describe how they occur and how to prevent them.

An enclosed CD-ROM contains software examples described in the text, plus various open-source security software testing tools, including Ethereal, Nessus, and Nmap. Any business serious about writing secure software should ensure that all of its code writers receive a copy of this book
2 of 4 people found the following review helpful
5.0 out of 5 stars A guide which includes a CD-ROM with source code and many tools described within Oct. 3 2005
By Midwest Book Review - Published on Amazon.com
Herbert H. Thompson and Scott G. Chase's Software Vulnerability Guide comes from a security director and a security architect, drawing upon their combined expertise to consider techniques developers need to use to produce secure code in modern software. Developers and testers receive both tools and assessments of tools designed to help recognize and prevent common vulnerabilties in source code. Commentary and code examples pack a guide which includes a CD-ROM with source code and many tools described within.

Look for similar items by category