0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

Open Source Fuzzing Tools (Paperback): Noam Rathaus, Gadi Evron Open Source Fuzzing Tools (Paperback)
Noam Rathaus, Gadi Evron
R1,253 Discovery Miles 12 530 Ships in 10 - 15 working days

Fuzzing is often described as a "black box" software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are indicative of the existence of a security vulnerability, which can later be researched and fixed.
Fuzz testing is now making a transition from a hacker-grown tool to a commercial-grade product. There are many different types of applications that can be fuzzed, many different ways they can be fuzzed, and a variety of different problems that can be uncovered. There are also problems that arise during fuzzing; when is enough enough? These issues and many others are fully explored.
-Learn How Fuzzing Finds Vulnerabilities
Eliminate buffer overflows, format strings and other potential flaws
-Find Coverage of Available Fuzzing Tools
Complete coverage of open source and commercial tools and their uses
-Build Your Own Fuzzer
Automate the process of vulnerability research by building your own tools
-Understand How Fuzzing Works within the Development Process
Learn how fuzzing serves as a quality assurance tool for your own and third-party software

Botnets - The Killer Web Applications (Paperback): Craig Schiller, James R Binkley Botnets - The Killer Web Applications (Paperback)
Craig Schiller, James R Binkley; Contributions by Anthony Bradley, Michael Cross, Gadi Evron, …
R1,577 Discovery Miles 15 770 Ships in 18 - 22 working days

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes them possible. The following chapters will analyze botnets for opportunities to detect, track, and remove them. Then the book will describe intelligence gathering efforts and results obtained to date. Public domain tools like OurMon, developed by Jim Binkley of Portland State University, will be described in detail along with discussions of other tools and resources that are useful in the fight against Botnets.
* This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise
* Botnets are the most complicated and difficult threat the hacker world has unleashed - read how to protect yourself

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Onyx Storm - The Empyrean: Book 3
Rebecca Yarros Hardcover R690 R593 Discovery Miles 5 930
Computational Approaches to the Network…
Liangyue Li, Hanghang Tong Hardcover R1,405 Discovery Miles 14 050
The Wren In The Holly Library - Oak…
K. A. Linde Hardcover R771 R685 Discovery Miles 6 850
Amazing Animals Alphabet Book
Amelia Cameron Hardcover R832 Discovery Miles 8 320
Bridging Relational and NoSQL Databases
Drazena Gaspar, Ivica Coric Hardcover R4,595 Discovery Miles 45 950
Benny bumble bee adventures
Philip M. Smith Paperback R187 Discovery Miles 1 870
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, … Hardcover R2,663 Discovery Miles 26 630
Mermaid Fillet
Mia Arderne Paperback  (2)
R320 R286 Discovery Miles 2 860
Dala Jumbo Glitter Shaker - Red (120g)
R81 Discovery Miles 810
Full House - A Wild Cards Collection
George R. R. Martin Paperback R461 Discovery Miles 4 610

 

Partners