Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fuzzing: Brute Force Vulnerability Discovery

Buy
The concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered through fuzzing. As a result of fuzzing being used so successfully on these mainstream products, it has received a resurgence of attention from the security community. The sheer fact that this is the first published book dedicated to the subject matter is an additional indicator that there is an increasing interest in fuzzing.

Having been involved in the vulnerability research community for years, we have used a variety of fuzzing technologies in our day to day work, ranging from hobby projects to high end commercial products. Each of the authors has been involved in the development of both privately held and publicly released fuzzers. We leveraged our combined experience and ongoing research projects to compose this bleeding edge book, which we hope you will find useful.

We strongly believe that the quantity and severity of vulnerabilities will continue to grow so long as security is deemed to be the sole responsibility of a security team. As such, we have taken strong efforts to write for a larger audience than just security researchers, including both readers who are new to fuzzing and those who have already had significant experience.

It is unrealistic to believe that secure applications can emerge from the development process if development organizations simply hand completed applications to a security team for a quick audit prior to production launch. Gone are the days when a developer or a member of the QA Team can say, "security's not my problem – we have a security team that worries about that". Security must now be everyone's problem. Security must be baked into the software development lifecycle (SDLC), not brushed on at the end.

Asking the development and QA teams to focus on security can be a tall order, especially for those that have not been asked to do so in the past. We believe that fuzzing presents a unique vulnerability discovery methodology that is accessible to a wide audience due to the fact that it can be highly automated. While we are hopeful that seasoned security researchers will gain valuable insights from this book, we are equally hopeful that it will be accessible to developers and QA teams. Fuzzing can and should be an integral part of any SDLC, not just at the testing phase, but also during development. The earlier a defect can be identified, the less costly it will be to remediate.

(HTML tags aren't allowed.)

3D Lighting: History, Concepts, and Techniques (With CD-ROM) (Graphics Series)
3D Lighting: History, Concepts, and Techniques (With CD-ROM) (Graphics Series)
The majority of computer graphics books are either too general or too application-specific. The field of 3-D computer graphics possesses tremendous depth, and any aspect of it is worthy of a focused career. In large studios, artists concentrate on just one phase of production, be it modeling, texturing, animation, or rendering. If you're...
Intensive Care of the Adult with Congenital Heart Disease (Congenital Heart Disease in Adolescents and Adults)
Intensive Care of the Adult with Congenital Heart Disease (Congenital Heart Disease in Adolescents and Adults)

Dedicated to the critical management of acutely ill adults with congenital heart disease, this comprehensive book discusses the many challenges faced in the management of these patients, who require intensive inter- and trans-disciplinary care. It provides the first universal review of the practical management of patients with these...

The Supply Chain Manager's Problem-Solver: Maximizing the Value of Collaboration and Technology (Resource Management)
The Supply Chain Manager's Problem-Solver: Maximizing the Value of Collaboration and Technology (Resource Management)

The true promise and benefits of Supply Chain Management elude many organizations. Cultural limitations, a narrow view of the opportunities offered by and the need to access external resources juxtaposed with a lack of understanding of how technology can enhance business processes create resistance. The Supply Chain Manager's...


Learning C#
Learning C#
With Learning C#, best-selling author Jesse Liberty will help you build a solid foundation in .NET and show how to apply your skills by using dozens of tested examples. You will learn how to develop various kinds of applications--including those that work with databases--and web services. Whether you have a...
PHP and MySQL Web Development, Second Edition
PHP and MySQL Web Development, Second Edition
PHP and MySQL Web Development teaches the reader to develop dynamic, secure, commercial Web sites. Using the same accessible, popular teaching style of the first edition, this best-selling book has been updated to reflect the rapidly changing landscape of MySQL and PHP.

The book teaches the reader to integrate and implement these technologies...

Exploitation of Linkage Learning in Evolutionary Algorithms (Adaptation, Learning, and Optimization)
Exploitation of Linkage Learning in Evolutionary Algorithms (Adaptation, Learning, and Optimization)

One major branch of enhancing the performance of evolutionary algorithms is the exploitation of linkage learning. This monograph aims to capture the recent progress of linkage learning, by compiling a series of focused technical chapters to keep abreast of the developments and trends in the area of linkage. In evolutionary algorithms, linkage...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy