The Artima Developer Community
Sponsored Link

Java Buzz Forum
Exploiting Software: How to Break Code

0 replies on 1 page.

Welcome Guest
  Sign In

Go back to the topic listing  Back to Topic List Click to reply to this topic  Reply to this Topic Click to search messages in this forum  Search Forum Click for a threaded view of the topic  Threaded View   
Previous Topic   Next Topic
Flat View: This topic has 0 replies on 1 page
Vinny Carpenter

Posts: 276
Nickname: vscarpente
Registered: Feb, 2003

Vinny is a Java developer/architect working with Java, J2EE, OO, Linux, OpenSource.
Exploiting Software: How to Break Code Posted: Feb 4, 2004 5:22 PM
Reply to this message Reply

This post originated from an RSS feed registered with Java Buzz by Vinny Carpenter.
Original Post: Exploiting Software: How to Break Code
Feed Title: Vinny Carpenter's Blog
Feed URL: http://www.j2eegeek.com/error.html
Feed Description: Welcome to my blog. I am a total Java geek that lives in Milwaukee, making my living as an architect/developer, spending all my time with Java, J2EE, OO, Linux, and open source. In my spare time, when I am not in front of my computers, I spend every other minute with my other loves: My wife, books, music, guitars, Formula-1 racing and StarGate. Check out my blog @ http://www.j2eegeek.com/blog
Latest Java Buzz Posts
Latest Java Buzz Posts by Vinny Carpenter
Latest Posts From Vinny Carpenter's Blog

Advertisement

Addison-Wesley has just released a new book entitled 'Exploiting Software: How to Break Code'. This book is going to be released on Feb 20th and looks like a really very interesting book. Here's more info on the book from the Addison-Wesley release I got.


Exploiting Software: How to Break Code


Greg Hoglund, Gary McGraw

Paperback: 512 pages

Publisher: Pearson Higher Education; (February 20, 2004)

ISBN: 0201786958

How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.

Programs have a preponderance of guts, where the real fun happens. These guts can be very complex. Exploiting software usually requires some level of understanding of software guts. DOWNLOAD a PDF of chapter 3, "Reverse Engineering and Program Understanding", to find out about the tools, concepts and assumptions behind reverse engineering, including how to write your own cracking tools.

This must-have book may shock you--and it will certainly educate you.Getting beyond the script kiddie treatment found in many hacking books, you will learn about
  • Why software exploit will continue to be a serious problem
  • When network security mechanisms do not work
  • Attack patterns
  • Reverse engineering
  • Classic attacks against server software
  • Surprising attacks against client software
  • Techniques for crafting malicious input
  • The technical details of buffer overflows
  • Rootkits

Check out the Book page for sample chapter at Addison-Wesley

Read: Exploiting Software: How to Break Code

Topic: I am Hopeless =/ Previous Topic   Next Topic Topic: Writing Comparator for sorting on columns

Sponsored Links



Google
  Web Artima.com   

Copyright © 1996-2019 Artima, Inc. All Rights Reserved. - Privacy Policy - Terms of Use