Nytro Posted March 20, 2013 Report Posted March 20, 2013 Exploiting Software How to Break CodeBy Greg HoglundGary McGrawPublisher: Addison WesleyPub Date: February 17, 2004ISBN: 0-201-78695-8Pages: 512How does software break? How do attackers make software break on purpose? Why arefirewalls, intrusion detection systems, and antivirus software not keeping out the bad guys?What tools can be used to break software? This book provides the answers.Exploiting Softwareis loaded with examples of real attacks, attack patterns, tools, andtechniques used by bad guys to break software. If you want to protect your software fromattack, you must first learn how real attacks are really carried out.This must-have book may shock you—and it will certainly educate you.Getting beyond thescript kiddie treatment found in many hacking books, you will learn aboutWhy software exploit will continue to be a serious problemWhen network security mechanisms do not workAttack patternsReverse engineeringClassic attacks against server softwareSurprising attacks against client softwareTechniques for crafting malicious inputThe technical details of buffer overflowsRootkitsDownload:http://par-anoia.net/assessment/books/security/Exploiting Software - How to Break Code - G. Hoglund, et al., (Addison-Wesley, 2004) WW.pdf Quote