Terdapat bibliografi dan indeks. Table of contents: Chapter 1: Why Is Security a Software Issue? 1.1 Introduction 1 1.2 The Problem 2 1.3 Software Assurance and Software Security 6 1.4 Threats to Software Security 9 1.5 Sources of Software Insecurity 11 1.6 The Benefits of Detecting Software Security Defects Early 13 1.7 Managing Secure Software Development 18 1.8 Summary 23 Chap…
Terdapat indeks. Table of Contents: Chapter 1. HTML5 The New Document Object Model (DOM) Cross-Origin Resource Sharing (CORS) WebSockets Web Storage Web Workers Flotsam & Jetsam Chapter 2. HTML Injection & Cross-Site Scripting (XSS) Understanding HTML Injection Employing Countermeasures Chapter 3. Cross-Site Request Forgery (CSRF) Understanding Cross-Site Reques…
Table of contents: Part I: Reversing 101. Chapter 1: Foundations. Chapter 2: Low-Level Software. Chapter 3: Windows Fundamentals. Chapter 4: Reversing Tools. Part II: Applied Reversing. Chapter 5: Beyond the Documentation. Chapter 6: Deciphering File Formats. Chapter 7: Auditing Program Binaries. Chapter 8: Reversing Malware. Part III: Cracking. Chapter 9: Piracy and Copy Protection…
Table of contents: Preface: Metadata Pt. I. Foundations Ch. 1. Setting the Stage Ch. 2. Into the Catacombs: IA-32 Ch. 3. Windows System Architecture Ch. 4. Rootkit Basics Pt. II. System Modification Ch. 5. Hooking Call Tables Ch. 6. Patching System Routines Ch. 7. Altering Kernel Objects Ch. 8…
Table of contents: Part 1. Introduction 1. What is software architecture? 2. Why is software architecture important? 3. The many contexts of software architecture Part 2. Quality Attibuties 4. Understanding quality attributes 5. Availability 6. Interoperability 7. Modifiability 8. Performance …
Table of contents: Ch. 1. Introduction Ch. 2. Viruses Ch. 3. Worms Ch. 4. Malicious Mobile Code Ch. 5. Backdoors Ch. 6. Trojan Horses Ch. 7. User-Mode RootKits Ch. 8. Kernel-Mode RootKits Ch. 9. Going Deeper Ch. 10. Scenarios Ch. 11. Malware Analysis Ch. 12. Conclusion
Table of Contents Chapter 1 Everything You Know Is Wrong The Myth of a Monoculture The iOS Security Model Storing the Key with the Lock Passcodes Equate to Weak Security Forensic Data Trumps Encryption External Data Is at Risk, Too Hijacking Traffic Trust No One, Not Even Your Application Physical Access Is …
Table of contents: 1. Introduction to the game of nature 2. The fascination of malicious code analysis 3. Malicious code environments 4. Classification of infection strategies 5. Classification of in-memory strategies 6. Basic self-protection strategies 7. Advanced code evolution techniques and computer virus generator kits …
Table of contents: Part I: Establishing the foundation. 1. Getting in gear 2. A brief history of malware 3. Cloak of the rootkit 4. Rise of the botnets Part II: Welcome to the jungle. 5. The threat ecosystem 6. The malware factory 7. Infection vectors 8. The compromised system …
Daftar isi: BAB 1 Produk BAB 2 Proses BAB 3 Konsep manajemen proyek BAB 4 Proses perangkat lunak dan metrik proyek BAB 5 Perencanaan proyek perangkat lunak BAB 6 Manajemen risiko BAB 7 Penjadwalan dan penelusuran proyek BAB 8 Jaminan kualitas perangkat lunak BAB 9 Manajemen konfigurasi perangkat lunak BAB 10 Rekayasa sistem BAB 11 Konsep dan prinsip analisis BAB 12 Pemode…