Skip to Main Content
Hack Proofing Your Web Applications
book

Hack Proofing Your Web Applications

by Syngress
June 2001
Intermediate to advanced content levelIntermediate to advanced
512 pages
18h 49m
English
Syngress
Content preview from Hack Proofing Your Web Applications
Hacking Techniques and Tools • Chapter 5 197
Thus began a line-by-line audit of over 20,000 lines of PERL scripts
and C source code. Over time, the process diagram began to take shape.
However, it seemed that every facet that was discovered in the system
yielded yet another two facets that were unknown. A line-by-line audit
provided only a sanity check of each specific function (all of which
passed). In order to assess any real security risk of an introduced back
door, a full-blown process audit would need to be performed.
Upon mention of the cost associated with mapping out the entirety
of the process flow and assessing the security of each step of the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Developer's Guide to Web Application Security

Developer's Guide to Web Application Security

Michael Cross
The CERT® Oracle® Secure Coding Standard for Java™

The CERT® Oracle® Secure Coding Standard for Java™

Fred Long, Dhruv Mohindra, Robert C. Seacord, Dean F. Sutherland, David Svoboda
Troubleshooting CentOS

Troubleshooting CentOS

Jonathan Hobson

Publisher Resources

ISBN: 9781928994312