Goodreads helps you keep track of books you want to read.
Start by marking “Exploiting Software: How to Break Code” as Want to Read:
Exploiting Software: How to Break Code
Enlarge cover
Rate this book
Clear rating
Open Preview

Exploiting Software: How to Break Code

3.39  ·  Rating details ·  69 ratings  ·  5 reviews
Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. "Exploiting Software" is loaded with examples of real attacks, attack patterns, tools, and techniques used to break software--a must-have title that may shock and educate readers.
Paperback, 512 pages
Published February 27th 2004 by Addison-Wesley Professional
More Details... Edit Details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Exploiting Software, please sign up.

Be the first to ask a question about Exploiting Software

Community Reviews

Showing 1-30
3.39  · 
Rating details
 ·  69 ratings  ·  5 reviews


More filters
 | 
Sort order
Alan Sanie
Aug 12, 2019 rated it really liked it
Shelves: pdf

Praise for Exploiting Software


Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day

...more
Jacqueline
Sep 01, 2014 rated it it was ok
Shelves: security, tech
Outdated. Barely skims over certain topics, and repeats simple things throughout the book. It does things like throw pages full of sample IDA plugin code at the end one of the first chapters - despite later chapters at times tending to treat the reader like a novice. (Annoyingly, there's no source code or other examples available online - really?)
Mack Volta
Mar 10, 2011 rated it liked it
*[ There's going to be a training regarding Software Security, so I want to learn something about it before I take it next week.- ]
Brian Powell
Apr 10, 2017 rated it it was ok
It's a catchy title. But it's also an inaccurate, disingenuous bait-and-switch. This is not a book about how to write exploits or malware. It does have a good bit of reverse engineering and debugging discussion within the context of IDA Pro (this is virtually all of Chapter 3, which is only useful if you have IDA Pro and care more about disassembling than crafting malware). As an analogy, imagine picking up a book on boating and finding that most of it was about how the engine is built.

The text
...more
Andrew Douma
rated it it was ok
Jun 26, 2016
derick amburgey
rated it really liked it
Aug 20, 2015
James
rated it it was amazing
Jan 08, 2009
J
rated it liked it
Sep 21, 2012
Nick Basil
rated it liked it
Sep 07, 2014
Adam
rated it liked it
Jul 10, 2012
Jeff
rated it really liked it
Oct 12, 2008
Ahmed Alomar
rated it really liked it
Oct 23, 2018
Daniel
rated it really liked it
Nov 28, 2018
Jack Rybinski
rated it it was amazing
Mar 07, 2016
Carlos Gaona
rated it liked it
Sep 09, 2008
Keith
rated it it was amazing
Jul 16, 2014
David
rated it liked it
Oct 02, 2013
Patrick
rated it liked it
Jan 03, 2016
Alessandro Parisi
rated it it was amazing
Jul 16, 2014
Nick
rated it liked it
Jan 23, 2010
Fullbuffer
rated it really liked it
May 27, 2014
Brandon
rated it really liked it
Aug 08, 2012
Anca
rated it liked it
Apr 11, 2016
Edd
rated it liked it
May 18, 2014
Courtney
rated it really liked it
Mar 27, 2008
Nazmul Ahmed Noyon
rated it really liked it
Oct 10, 2017
Kevin
rated it liked it
Aug 02, 2011
Will Klutch
rated it liked it
Jul 01, 2014
Camillo Särs
rated it really liked it
Dec 26, 2018
« previous 1 3 next »
There are no discussion topics on this book yet. Be the first to start one »