The definitive insider's guide to auditing software security is penned by leading security consultants who have personally uncovered vulnerabilities in applications ranging from "sendmail" to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.
There are no customer reviews available at this time. Would you like to write a review?
Addison Wesley Professional
November 20, 2006
Number of Print Pages*
Adobe DRM EPUB
* Number of eBook pages may differ. Click here for more information.