O'Reilly logo

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities by Justin Schuh, John McDonald, Mark Dowd

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Index

Symbols

/bin directory (UNIX), 463

/etc directory (UNIX), 463

/home directory (UNIX), 463

%m format specifier, 423

/sbin directory (UNIX), 463

/var directory (UNIX), 463

A

AASP (Active Server Pages), 1013

Abstract Syntax Notation (ASN.1). See ASN.1 (Abstract Syntax Notation)

Abstraction, software design, 27

ACC (allocation-check-copy) logs, 363

auditing, 362-369

data assumptions, 365-366

order of action, 366-367

unanticipated conditions, 364-365

Accept header field (HTTP), 1018

Accept-Charset header field (HTTP), 1018

Accept-Encoding header field (HTTP), 1018

Accept-Language header field (HTTP), 1018

Accept-Ranges header field (HTTP), 1018

access control, 1057-1058

ASP.NET, 1122

DCOM (Distributed Component Object Model), 734-736

vunerabilities, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required