Издательство: | Книга по требованию |
Дата выхода: | июль 2011 |
ISBN: | 978-3-6392-0178-9 |
Объём: | 120 страниц |
Масса: | 203 г |
Размеры(В x Ш x Т), см: | 23 x 16 x 1 |
Our reliance on computer systems for everyday life activities has increased over the years as more and more tasks are accomplished with their help. The increasing complexity of the problems they address also requires the development of more elaborated solutions. So, applications tend to become larger and more complex. On the other hand, the ever present tradeoff between time to deployment and thorough testing impacts the quality of the software. Hence, applications tend to be released with little testing and software bugs are continuously detected afterwards, resulting in security vulnerabilities that can be exploited by malicious adversaries and compromise the systems' security. The discovery of security vulnerabilities is then a valuable asset in the development of dependable systems. This book presents a methodology based on fault injection that uses to network attacks to assess the presence of vulnerabilities in servers. Attack injection emulates the behavior of an adversary by injecting attacks to trigger and detect abnormal behavior in network servers.
Данное издание не является оригинальным. Книга печатается по технологии принт-он-деманд после получения заказа.