• Contact

  • Newsletter

  • About us

  • Delivery options

  • Prospero Book Market Podcast

  • News

  • 0
    An Analysis of Software Security Attacks and Mitigation Controls: From an implementation point of view

    An Analysis of Software Security Attacks and Mitigation Controls by Meghanathan, Natarajan; Johnson, DeShante C.; Geoghegan, Alexander R.;

    From an implementation point of view

      • GET 5% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice EUR 49.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        20 785 Ft (19 796 Ft + 5% VAT)
      • Discount 5% (cc. 1 039 Ft off)
      • Discounted price 19 747 Ft (18 806 Ft + 5% VAT)

    20 785 Ft

    db

    Availability

    printed on demand

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Publisher LAP Lambert Academic Publishing
    • Date of Publication 1 January 2012

    • ISBN 9783659309441
    • Binding Paperback
    • No. of pages76 pages
    • Size 220x150 mm
    • Language English
    • 0

    Categories

    Long description:

    The security vulnerabilities hidden in software programs pose a major threat, on the computers and networks, when appropriately exploited by a malicious user. The vulnerabilities arise primarily due to the coding errors and/or flaws in the underlying platform. The book researches on the well-known coding and platform vulnerabilities related to the security of software programs and the attacks they lead to. Specifically, the following software security attacks are analyzed in detail: SQL injection attacks, Cross-site scripting (XSS) attacks, Cross-site request forgery (XSRF) attacks, and the Time-of-check-to-time-of-use (TOCTTOU) attacks. The book examines the vulnerabilities that lead to each of these attacks, illustrates real-time examples of implementing these attacks with step-by-step instructions, as well as explores the use of appropriate security controls to completely avoid or at least mitigate the attacks. In addition to analyzing the above attacks in detail, the book presents a high-level overview of the following software security attacks: Linearization attacks, Arithmetic overflow attacks, Buffer overflow attacks, Stack smashing buffer overflow and Format string attacks.

    More
    Recently viewed
    previous
    An Analysis of Software Security Attacks and Mitigation Controls: From an implementation point of view

    An Analysis of Software Security Attacks and Mitigation Controls: From an implementation point of view

    Meghanathan, Natarajan; Johnson, DeShante C.; Geoghegan, Alexander R.;

    20 785 HUF

    next