LEADER 05367nam 22006854a 450 001 9910458833603321 005 20200520144314.0 010 $a1-281-14515-7 010 $a9786611145156 010 $a0-08-055561-6 035 $a(CKB)1000000000383559 035 $a(EBL)330152 035 $a(OCoLC)476128721 035 $a(SSID)ssj0000076904 035 $a(PQKBManifestationID)11107432 035 $a(PQKBTitleCode)TC0000076904 035 $a(PQKBWorkID)10038082 035 $a(PQKB)10975136 035 $a(MiAaPQ)EBC330152 035 $a(CaSebORM)9781597491952 035 $a(Au-PeEL)EBL330152 035 $a(CaPaEBR)ebr10206135 035 $a(CaONFJC)MIL114515 035 $a(EXLCZ)991000000000383559 100 $a20080118d2007 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 00$aOpen source fuzzing tools$b[electronic resource] /$fGadi Evron ... [et al.] 205 $a1st edition 210 $aBurlington, MA $cSyngress Pub.$dc2007 215 $a1 online resource (209 p.) 300 $aIncludes index. 311 $a1-59749-195-0 327 $aFront Cover; Open Source Fuzzing Tools; Copyright Page; Contributing Authors; Contents; Chapter 1: Introduction to Vulnerability Research; Statement of Scope; Off-by-One Errors; Programming Language Use Errors; Integer Overflows; Bugs and Vulnerabilities; The Vaunted Buffer Overflow; Finding Bugs and Vulnerabilities; Source Code Review; Black Box Testing; Glass Box Testing; Chapter 2: Fuzzing-What's That?; Introduction; Introduction to Fuzzing; Milestones in Fuzzing; Fuzzing Technology; Traffic Sniffing; Prepared Template; Second-Generation Fuzzing; File Fuzzing; Host-side Monitoring 327 $aVulnerability Scanners as Fuzzers Uses of Fuzzing; Open Source Fuzzers; Commercial-Grade Fuzzers; What Comes Next; The Software Development Life Cycle; Chapter 3: Building a Fuzzing Environment; Introduction; Knowing What to Ask...; Basic Tools and Setup; Data Points; Crash Dumps; Fuzzer Output; Debuggers; Recon Tools; Linux; OSX; Summary; Chapter 4: Open Source Fuzzing Tools; Introduction; Frameworks; Special-Purpose Tools; General-Purpose Tools; Chapter 5: Commercial Fuzzing Solutions; Introduction; beSTORM (by Beyond Security); BPS-1000 (by BreakingPoint Systems); Codenomicon 327 $aMu-4000 Security Analyzer (by Mu Security)Chapter 6: Build Your Own Fuzzer; Hold Your Horses; Fuzzer Building Blocks; One or More Valid Data Sets; Understanding What Each Bytein the Data Set Means; Change the Values of the Data Sets While Maintaining the Integrity of the Data Being Sent; Recreate the Same Malformed DataSet Time and Time Again; An Arsenal of Malformed Values, or the Ability to Create a Variety of Malformed Outputs; Maintain a Form of a State Machine; Summarize; Down to Business; Simplest Fuzz Testing Find Issues; Chapter 7: Integration of Fuzzing in the Development Cycle 327 $aIntroduction Why Is Fuzzing Important to Include in a Software Development Cycle?; Security Testing Workload; Setting Expectations for Fuzzers in a Software Development Lifecycle; Fuzzing as a Panacea; Fuzzing Tools versus ...; Setting the Plan for Implementing Fuzzers into a Software Development Lifecycle; Setting Goals; Building and Executing on the Plan; Understanding How to Increase Effectiveness of Fuzzers, and Avoiding Any Big Gotchas; Hidden Costs; Finding More Vulnerabilities; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8: Standardization and Certification 327 $aFuzzing and the Corporate Environment Software Security Testing, the Challenges; Testing for Security; Fuzzing as a Viable Option; Business Pressure; Software Security Certification; Meeting Standards and Compliance; Tester Certification; Industry Pressure; Antivirus Product Testing and Certification; Chapter 9: What Is a File?; Introduction; Are File Fuzzers Special?; Analyzing and Building Files; Textual Files; Binary Files; Running the Test; Monitoring the Application with the Test Cases; Chapter 10: Code Coverage and Fuzzing; Introduction; Code Coverage; Obtaining Code Coverage 327 $aInstrumenting the Binary 330 $aA ""fuzzer"" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has defects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it! Open Source Fuzzing Tools is the first book to market that covers the subject of black box testing using fuzzing techniques. Fuzzing has been around for a while, but is making a transition from hacker home-grown tool to commercial-grade quality assurance 606 $aComputer software$xTesting 606 $aOpen source software 606 $aDebugging in computer science 608 $aElectronic books. 615 0$aComputer software$xTesting. 615 0$aOpen source software. 615 0$aDebugging in computer science. 676 $a005.14 676 $a005.8 701 $aEvron$b Gadi$0920171 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910458833603321 996 $aOpen source fuzzing tools$92064033 997 $aUNINA LEADER 03113nam 22004811a 450 001 9910511363803321 005 20200514202323.0 010 $a1-350-02222-5 010 $a1-350-02219-5 024 7 $a10.5040/9781350022225 035 $a(CKB)4100000005117287 035 $a(MiAaPQ)EBC5435931 035 $a(OCoLC)1041931044 035 $a(UkLoBP)bpp09262025 035 $a(EXLCZ)994100000005117287 100 $a20180531d2018 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aJapan's occupation of Java in the Second World War$b[electronic resource] $ea transnational history /$fEthan Mark 210 $aLondon $cBloomsbury Academic$d2018 215 $a1 online resource (401 pages) 225 1 $aSOAS studies in modern and contemporary Japan 311 $a1-350-14406-1 311 $a1-350-02220-9 320 $aIncludes bibliographical references (pages 363-373) and index. 327 $aTable of Contents -- 1 Introduction: An Asian Intersection -- Chapter 1. Out of China -- Chapter 2. Crisis, Japan, and ?Asia? in Prewar Java -- Chapter 3. Venturing South -- Chapter 4. First Encounters -- Chapter 5. Restoring Orders -- Chapter 6. Greater Asia Indonesian-Style -- Chapter 7. Father Figures -- Chapter 8. Normalization -- Chapter 9. Reckonings -- Conclusion: Resituating Greater Asia 330 $a"Japan's Occupation of Java in the Second World War draws upon written and oral Japanese, Indonesian, Dutch and English-language sources to narrate the Japanese occupation of Java as a transnational intersection between two complex Asian societies, placing this narrative in a larger wartime context of domestic, regional, and global crisis. Japan's occupation of Java is here revealed in a radically new and nuanced light, as an ambiguous encounter revolutionary in the degree of mutual interests that drew the two sides together, fascinating and tragic in its evolution, and profound in the legacies left behind. Mark structures his study around a diverse group of Japanese and Indonesians captivated by the wartime vision of a 'Greater Asia.' The book is not only the first transnational study of Japan's wartime occupation of Java, but the first to focus on the Second World War experience in transnational terms 'on the ground' anywhere in Asia. Breaking new ground interpretatively, thematically and narratively, Mark's monumental study is of vital significance for students and scholars of modern Asian and global history."--Bloomsbury Publishing. 410 0$aSOAS studies in modern and contemporary Japan. 606 $aWorld War, 1939-1945$xAtrocities$zIndonesia 607 $aIndonesia$xHistory$yJapanese occupation, 1942-1945 615 0$aWorld War, 1939-1945$xAtrocities 676 $a959.8022 700 $aMark$b Ethan$f1965-$01068303 801 0$bUtOrBLW 801 1$bUtOrBLW 801 2$bUkLoBP 906 $aBOOK 912 $a9910511363803321 996 $aJapan's occupation of Java in the Second World War$92552882 997 $aUNINA LEADER 01387oam 2200385 a 450 001 9910701348503321 005 20120314120535.0 035 $a(CKB)5470000002417583 035 $a(OCoLC)780082104 035 $a(EXLCZ)995470000002417583 100 $a20120314d2011 ua 0 101 0 $aeng 135 $aurmn||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aGuide for preparing shipping papers$b[electronic resource] 210 1$a[Washington, D.C.] :$cU.S. Dept. of Transportation, Pipeline and Hazardous Materials Safety Administration,$d[2011?] 215 $a1 online resource (5 pages) $ccolor forms 300 $a"PHH50-0121-1110." 300 $aTitle from title screen (viewed on Mar. 14, 2012). 517 3 $aShipping papers 606 $aHazardous substances$xTransportation$xDocumentation$vHandbooks, manuals, etc 606 $aShipping$xDocumentation$vHandbooks, manuals, etc 608 $aHandbooks and manuals.$2lcgft 615 0$aHazardous substances$xTransportation$xDocumentation 615 0$aShipping$xDocumentation 712 02$aUnited States.$bPipeline and Hazardous Materials Safety Administration. 801 0$bGPO 801 1$bGPO 801 2$bGPO 906 $aBOOK 912 $a9910701348503321 996 $aGuide for preparing shipping papers$93145615 997 $aUNINA