Chapter 13. Testing for Software Security


  • WarGames—the Movie

  • Understanding the Motivation

  • Threat Modeling

  • Is Software Security a Feature? Is Security Vulnerability a Bug?

  • Understanding the Buffer Overrun

  • Using Safe String Functions

  • Computer Forensics

It seems as though a day doesn't go by without a news story about yet another computer security issue. Hackers, viruses, worms, spyware, backdoors, Trojan horses, and denial-of-service attacks have become common terms. Even average computer users have been impacted beyond the nuisance level, losing important data and valuable time restoring their systems after an attack. A January 14, 2005, story in the LA Times by Joseph Menn, titled, “No More Internet for Them,” reveals that many people ...

Get Software Testing, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.