Table of contents: 1. Defining a discipline 2. A risk management framework 3. Introduction to software security touchpoints 4. Code review with a tool 5. Architectural risk analysis 6. Software penetration testing 7. Risk-based security testing 8. Abuse cases 9. Software security meets security operations 10. An enterprise software security program 11. Knowledge for software security…
Table of contents: 1. Software - The Root of the Problem 2. Attack Patterns 3. Reverse Engineering and Program Understanding 4. Exploiting Server Software 5. Exploiting Client Software 6. Crafting (Malicious) Input 7. Buffer Overflow 8. Rootkits