Description |
1 online resource |
|
text file |
Bibliography |
Includes bibliographical references and index. |
Contents |
Ch. 1. Vulnerability discovery methodologies -- Ch. 2. What is fuzzing? -- Ch. 3. Fuzzing methods and fuzzer types -- Ch. 4. Data representation and analysis -- Ch. 5. Requirements for effective fuzzing -- Ch. 6. Automation and data generation -- Ch. 7. Environment variable and argument fuzzing -- Ch. 8. Environment variable and argument fuzzing : automation -- Ch. 9. Web application and server fuzzing -- Ch. 10. Web application and server fuzzing : automation -- Ch. 11. File format fuzzing -- Ch. 12. File format fuzzing : automation on UNIX -- Ch. 13. File format fuzzing : automation on windows -- Ch. 14. Network protocol fuzzing -- Ch. 15. Network protocol fuzzing : automation on UNIX -- Ch. 16. Network protocol fuzzing : automation on windows -- Ch. 17. Web Browser fuzzing -- Ch. 18. Web Browser fuzzing : automation -- Ch. 19. In-memory fuzzing -- Ch. 20. In-memory fuzzing : automation -- Ch. 21. Fuzzing frameworks -- Ch. 22. Automated protocol dissection -- Ch. 23. Fuzzer tracking -- Ch. 24. Intelligent fault detection -- Ch. 25. Lessons learned -- Ch. 26. Looking forward. |
Access |
Use copy Restrictions unspecified star MiAaHDL |
Summary |
"Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work."--Jacket |
Reproduction |
Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2011. MiAaHDL |
System Details |
Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL |
Processing Action |
digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL |
Language |
English. |
Subject |
Computer security.
|
|
Computer networks -- Security measures.
|
|
Computer software -- Development.
|
|
Sécurité informatique. |
|
Réseaux d'ordinateurs -- Sécurité -- Mesures. |
|
Computer security. |
|
Computer networks -- Security measures. |
|
Computer software -- Development. |
|
Computer networks -- Security measures |
|
Computer security |
|
Computer software -- Development |
|
Computersicherheit |
|
Datensicherung |
|
Rechnernetz |
Indexed Term |
Intrusion Detection |
Added Author |
Greene, Adam, 1983-
|
|
Amini, Pedram.
|
Other Form: |
Print version: Sutton, Michael, 1973- Fuzzing. Upper Saddle River, N.J. : Addison-Wesley, 2007 (DLC) 2007011463 (OCoLC)86117714 |
ISBN |
9780321446114 |
|
0321446119 |
|
0321525019 |
|
9780321525017 |
|
9781282680968 (online) |
|
128268096X |
|
9788131747797 (online) |
|
8131747794 |
Standard No. |
9780321446114 |
|