Contents I Introduction to Software Security Assessment 1 SOFTWARE VULNERABILITY FUNDAMENTALS 3 2 DESIGN REVIEW 25 3 OPERATIONAL REVIEW 6 4 APPLICATION REVIEW PROCESS 91 II Software Vulnerabilities 5 MEMORY CORRUPTION 167 6 C LANGUAGE ISSUES 203 7 PROGRAM BUILDING BLOCKS 297 8 STRINGS ANDMETACHARACTERS 387 9 UNIX I: PRIVILEGES AND FILES 459
10 UNIX II: PROCESSES 559 11 WINDOWS I: OBJECTS AND THE FILE SYSTEM 625 12 WINDOWS II: INTERPROCESS COMMUNICATION 685 13 SYNCHRONIZATION AND STATE 755 III Software Vulnerabilities in Practice 14 NETWORK PROTOCOLS 829 15 FIREWALLS 891 16 NETWORK APPLICATION PROTOCOLS 921 17 WEB APPLICATIONS 1007 18 WEB TECHNOLOGIES 1083 BIBLIOGRAPHY 1125 INDEX 1129
Contents: Preface 1. How to Define Your Project 2. How to Decide Upon a Methodology 3. How to Choose Your Research Methods 4. How to Conduct Background Research 5. How to Choose Your Participants 6. How to Prepare a Research Proposal 7. How to Conduct Interviews 8. How to Conduct Focus Groups 9. How to Construct Questionnaires 10. How to Carry Out Participant Observation 11. How to …
Part I FOUNDATIONAL QUESTIONS OF CYBERWAR 1.The Nature of War and the Idea of "Cyberwar" / Larry May 2.Is There Anything Morally Special about Cyberwar? / James L Cook 3.Cyber Causation / Jens David Ohlin Part II CONCEPTUALIZING CYBER ATTACKS: THE CIVIL-MILITARY DIVIDE 4.Cyberterrorism and Enemy Criminal Law / Stuart Macdonald 5.Cyberwar versus Cyber Attack: The Role of Rhet…
terdapat indeks
Terdapat indeks. 1. Machine generated contents note: I.Transceiver Concepts and Design 2. Software-Defined Transceivers 3. Adaptive Multi-Mode RF Front-End Circuits 4. Precise Delay Alignment Between Amplitude and Phase 5. Overview of Front-End RF Passive Integration into SoCs 6. ADCs and DACs for Software-Defined Radio 7. OFDM Transform-Domain Receivers for Multi-Standard Communic…
Abstraksi KOMUNIKASI & HUBUNGAN MASYARAKAT INTERNASIONAL Kehidupan masyarakat internasional begitu cepat bergeser ke arah paradigma baru yang kemudian disebut dengan globalisasi. Sekat batas antar-negara nyaris dibuatnya hilang hingga setiap anggota masyarakat disudut bumi manapun seakan mengikuti “skenario” hidup yang identik dengan gaya hidup global dengan trend yang demikian pesat ber…
An Introduction to Networking / 1 Why Use Networks? / 2 Types of Networks / 3 Peer-to-Peer Networks / 3 Client/Server Networks / 5 LANs, MANs, and WANs / 7 Elements Common to Client/Server Networks / 9 How Networks Are Used / 12 File and Print Services/ 12 Access Services / 13 Communications Services / 13 Internet Services / 14 Management Services / 14 Becoming a Ne…
Why is Wireless Different? Introduction Protecting The Means Of Communication Protecting Privacy Promoting Safety The Personal and the Public Shaking Up the Status Quo Understanding wireless Forecasts Reasonable Degree of Security Regulatory Environments and Issues Security-Related Regulations Security Related Market Factors Guideliens for Security Measures Celluler Networka and B…
Daftar Isi Kata Pengantar vii Daftar Isi ix 1. BAB I MEMPERSIAPKAN INFRASTRUKTUR 1 2. BAB 2 BERKENALAN DENGAN SQL 15 2.1. Menggunakan phpMyAdmin / 21 2.1.1. Membuat Database / 22 2.1.2. Membuat Tabel / 22 2.1.3. Memasukkan Data / 24 2.1.4. Melihat isi label / 26 2.1.5. Export & Import Database / 28 2.1.6. Menghapus Tabel / 34 2.2. Menggunakan SQL dalam phpMyAdmin / 35 2.2.1. M…