Text
Testing code security
Contents:
1. Introduction
2. Security vocabulary
3. Software testing and changes in the security landscape
4. All trust is misplaced
5. Security testing considerations
6. Threat modeling and risk assessment processes
7. Personas and testing
8. Security test planning
9. Sample security considerations
10. Vulnerability case study : brute force browsing
11. Vulnerability case study : buffer overruns
12. Vulnerability case study : cookie tampering
13. Vulnerability case study : cross-site scripting (XSS)
14. Vulnerability case study : denial of service/distributed denial of service
15. Vulnerability case study : format string vulnerabilities
16. Vulnerability case study : integer overflows and underflows
17. Vulnerability case study : man-in-the-middle attacks
18. Vulnerability case study : password cracking
19. Vulnerability case study : session hijacking
20. Vulnerability case study : spoofing attacks
21. Vulnerability case study : SQL injection
22. Fuzz testing
23. Background : cryptography
24. Background : firewalls
25. Background : OSI network model
26. Background : proxy servers
27. Background : TCP/IP and other networking protocols
No other version available