Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Sutton, Michael, 1973-

Title Fuzzing : brute force vulnerabilty discovery / Michael Sutton, Adam Greene, Pedram Amini. [O'Reilly electronic resource]

Imprint Upper Saddle River, N.J. : Addison-Wesley, 2007.
QR Code
Description 1 online resource
text file
Bibliography Includes bibliographical references and index.
Contents Ch. 1. Vulnerability discovery methodologies -- Ch. 2. What is fuzzing? -- Ch. 3. Fuzzing methods and fuzzer types -- Ch. 4. Data representation and analysis -- Ch. 5. Requirements for effective fuzzing -- Ch. 6. Automation and data generation -- Ch. 7. Environment variable and argument fuzzing -- Ch. 8. Environment variable and argument fuzzing : automation -- Ch. 9. Web application and server fuzzing -- Ch. 10. Web application and server fuzzing : automation -- Ch. 11. File format fuzzing -- Ch. 12. File format fuzzing : automation on UNIX -- Ch. 13. File format fuzzing : automation on windows -- Ch. 14. Network protocol fuzzing -- Ch. 15. Network protocol fuzzing : automation on UNIX -- Ch. 16. Network protocol fuzzing : automation on windows -- Ch. 17. Web Browser fuzzing -- Ch. 18. Web Browser fuzzing : automation -- Ch. 19. In-memory fuzzing -- Ch. 20. In-memory fuzzing : automation -- Ch. 21. Fuzzing frameworks -- Ch. 22. Automated protocol dissection -- Ch. 23. Fuzzer tracking -- Ch. 24. Intelligent fault detection -- Ch. 25. Lessons learned -- Ch. 26. Looking forward.
Access Use copy Restrictions unspecified star MiAaHDL
Summary "Fuzzing is the first and only book to cover fuzzing from start to finish, bringing disciplined best practices to a technique that has traditionally been implemented informally. The authors begin by reviewing how fuzzing works and outlining its crucial advantages over other security testing methods. Next, they introduce state-of-the-art fuzzing techniques for finding vulnerabilities in network protocols, file formats, and web applications; demonstrate the use of automated fuzzing tools; and present several insightful case histories showing fuzzing at work."--Jacket
Reproduction Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2011. MiAaHDL
System Details Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL
Processing Action digitized 2011 HathiTrust Digital Library committed to preserve pda MiAaHDL
Language English.
Subject Computer security.
Computer networks -- Security measures.
Computer software -- Development.
Sécurité informatique.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Computer security.
Computer networks -- Security measures.
Computer software -- Development.
Computer networks -- Security measures
Computer security
Computer software -- Development
Computersicherheit
Datensicherung
Rechnernetz
Indexed Term Intrusion Detection
Added Author Greene, Adam, 1983-
Amini, Pedram.
Other Form: Print version: Sutton, Michael, 1973- Fuzzing. Upper Saddle River, N.J. : Addison-Wesley, 2007 (DLC) 2007011463 (OCoLC)86117714
ISBN 9780321446114
0321446119
0321525019
9780321525017
9781282680968 (online)
128268096X
9788131747797 (online)
8131747794
Standard No. 9780321446114
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information