This post originated from an RSS feed registered with Java Buzz
by Vinny Carpenter.
Original Post: Exploiting Software: How to Break Code
Feed Title: Vinny Carpenter's Blog
Feed URL: http://www.j2eegeek.com/error.html
Feed Description: Welcome to my blog. I am a total Java geek that lives in Milwaukee, making my living as an architect/developer, spending all my time with Java, J2EE, OO, Linux, and open source. In my spare time, when I am not in front of my computers, I spend every other minute with my other loves: My wife, books, music, guitars, Formula-1 racing and StarGate. Check out my blog @ http://www.j2eegeek.com/blog
Addison-Wesley has just released a new book entitled 'Exploiting Software: How to Break Code'. This book is going to be released on Feb 20th and looks like a really very interesting book. Here's more info on the book from the Addison-Wesley release I got.
How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers.
Programs have a preponderance of guts, where the real fun happens. These guts can be very complex. Exploiting software usually requires some level of understanding of software guts. DOWNLOAD a PDF of chapter 3, "Reverse Engineering and Program Understanding", to find out about the tools, concepts and assumptions behind reverse engineering, including how to write your own cracking tools.
This must-have book may shock you--and it will certainly educate you.Getting beyond the script kiddie treatment found in many hacking books, you will learn about
Why software exploit will continue to be a serious problem