Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Title Page
Copyright Page
Dedication
Table of Contents
Foreword
Preface
Acknowledgments
About the Authors
Part I: Introduction
Chapter 1. Case Your Own Joint: A Paradigm Shift from Traditional Software Testing
Chapter 2. How Vulnerabilities Get into All Software
Chapter 3. The Secure Software Development Lifecycle
Chapter 4. Risk-Based Security Testing: Prioritizing Security Testing with Threat Modeling
Chapter 5. Shades of Analysis: White, Gray, and Black Box Testing
Part II: Performing the Attacks
Chapter 6. Generic Network FaultInjection
Chapter 7. Web Applications: Session Attacks
Chapter 8. Web Applications: Common Issues
Chapter 9. Web Proxies: Using WebScarab
Chapter 10. Implementing a Custom Fuzz Utility
Chapter 11. Local Fault Injection
Part III: Analysis
Chapter 12. Determining Exploitability
Index
← Prev
Back
Next →
← Prev
Back
Next →