O'Reilly logo

Software Testing, Second Edition by Ron Patton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 13. Testing for Software Security

IN THIS CHAPTER

  • WarGames—the Movie

  • Understanding the Motivation

  • Threat Modeling

  • Is Software Security a Feature? Is Security Vulnerability a Bug?

  • Understanding the Buffer Overrun

  • Using Safe String Functions

  • Computer Forensics

It seems as though a day doesn't go by without a news story about yet another computer security issue. Hackers, viruses, worms, spyware, backdoors, Trojan horses, and denial-of-service attacks have become common terms. Even average computer users have been impacted beyond the nuisance level, losing important data and valuable time restoring their systems after an attack. A January 14, 2005, story in the LA Times by Joseph Menn, titled, “No More Internet for Them,” reveals that many people ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required