Buy Used
CDN$ 6.44
+ CDN$ 6.49 shipping
Used: Good | Details
Condition: Used: Good
Comment: Shipped from the US -- Expect delivery in 1-2 weeks. Shows some signs of wear, and may have some markings on the inside. 100% Money Back Guarantee. Shipped to over one million happy customers. Your purchase benefits world literacy!
Have one to sell?
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Software Vulnerability Guide Paperback – Jun 3 2005

See all 2 formats and editions Hide other formats and editions
Amazon Price
New from Used from
"Please retry"
CDN$ 9.84
Paperback, Jun 3 2005
CDN$ 76.90 CDN$ 6.44

Harry Potter and the Cursed Child
click to open popover

No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
Getting the download link through email is temporarily not available. Please check back later.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Product Details

  • Paperback: 350 pages
  • Publisher: Charles River Media; 1 edition (May 2005)
  • Language: English
  • ISBN-10: 1584503580
  • ISBN-13: 978-1584503583
  • Product Dimensions: 23.5 x 18.8 x 2.6 cm
  • Shipping Weight: 780 g
  • Average Customer Review: Be the first to review this item
  • Amazon Bestsellers Rank: #3,234,591 in Books (See Top 100 in Books)
  •  Would you like to update product info, give feedback on images, or tell us about a lower price?

  • See Complete Table of Contents

Product Description

About the Author

Herbert Thompson (Melbourne Beach, FL) is the Director of Security Technology at Security Innovation LLC. He holds a Ph.D. in Applied Mathematics from the Florida Institute of Technology and is CISSP, CCNA, and MCP certified. Scott Chase (Melbourne, FL) is the Director of Security Testing for Security Innovation LLC, where he manages a team of professional security testers and develops testing methodologies and tools.

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star

Most Helpful Customer Reviews on (beta) HASH(0xa3f67dc8) out of 5 stars 6 reviews
14 of 14 people found the following review helpful
HASH(0xa3ba9e4c) out of 5 stars Very concise and helpful Dec 15 2005
By B. Madden - Published on
Format: Paperback Verified Purchase
I've maybe read three or four books on the subject of software security and this is the best so far. Very concise and well organized and covers just about every facet of software vulnerabilities that I've ever heard of. Very helpful too because at the end of each chapter it gives detailed advice on how to avoid the vulnerability that they discussed. Also, the CD comes with some nice tools and source code. I definitely learned a lot from this book and highly recommend it to both web application and desktop application developers.
11 of 11 people found the following review helpful
HASH(0xa3bab0d8) out of 5 stars Microsoft MVP 2005 - Visual C# gives this a big thumbs up! July 20 2005
By Robbe D. Morris - Published on
Format: Paperback
If you consider yourself a solid developer but know you probably don't give the security of your software/databases as much attention as you should, then you need to get your hands on The Software Vulnerability Guide.

Unlike a lot of other security books, this one isn't full of a bunch of vagure generalities. It gives you solid details on some of the most common (and perhaps some less common) holes that exist in the software you just released. The information contained in each useful chapter is easily digestable by beginners.

Buy the book and spare yourself the embarrassment from some twenty something who stole some script off the web and deleted all the data in your intranet application.
2 of 2 people found the following review helpful
HASH(0xa3bab3a8) out of 5 stars Recommended if you care about Quality Software Feb. 10 2010
By P. Manno - Published on
Format: Paperback Verified Purchase
Unsecure software is always poorly written/low quality software. This book will help you identify problems and provide the insight necessary to write higher quality code.
2 of 3 people found the following review helpful
HASH(0xa3bab558) out of 5 stars Excellent resource for software developers May 30 2006
By Ben Rothke - Published on
Format: Paperback
Every month, hundreds of security vulnerabilities and warnings are announced. Although they cover a wide set of products and programs, the underlying reason for them is generally the same: insecurely written software. When software is written in insecure code (which includes most software programs written today), serious security flaws are inevitable.

The Software Vulnerability Guide was written to help software developers acquire the methods necessary to write secure code and find existing problems in current software. After making a persuasive case for secure code in part one, the book progresses into the areas that are crucial to writing secure software.

Part two of the book covers system-level attacks and details important topics such as passwords, scripts and macros, and dynamic linking and loading (DLL). Part three plunges into attacks on the software, exploring heady concepts such as buffer overflows, format-string vulnerabilities, and integer overflow vulnerabilities. Most of these attacks have been known for decades but are only receiving wide-scale attention now.

Further chapters delve into securing data and Web servers. For each of the vulnerabilities mentioned, the authors describe how they occur and how to prevent them.

An enclosed CD-ROM contains software examples described in the text, plus various open-source security software testing tools, including Ethereal, Nessus, and Nmap. Any business serious about writing secure software should ensure that all of its code writers receive a copy of this book
2 of 4 people found the following review helpful
HASH(0xa3bab960) out of 5 stars A guide which includes a CD-ROM with source code and many tools described within Oct. 3 2005
By Midwest Book Review - Published on
Format: Paperback
Herbert H. Thompson and Scott G. Chase's Software Vulnerability Guide comes from a security director and a security architect, drawing upon their combined expertise to consider techniques developers need to use to produce secure code in modern software. Developers and testers receive both tools and assessments of tools designed to help recognize and prevent common vulnerabilties in source code. Commentary and code examples pack a guide which includes a CD-ROM with source code and many tools described within.