Secure Coding mailing list archives
Re: Exploiting Software: How to Break Code
From: "Gary McGraw" <gem () cigital com>
Date: Thu, 11 Nov 2004 14:08:28 +0000
I think it's a great book. But then again, I wrote it. What do you want to know about it? gem -----Original Message----- From: Dana Epp [mailto:[EMAIL PROTECTED] Sent: Thu Nov 11 03:21:55 2004 To: Greenarrow 1; sc-l Subject: Re: [SC-L] Exploiting Software: How to Break Code George, I wrote a review about the book on my blog at: http://silverstr.ufies.org/blog/archives/000592.html Not sure if thats what you are looking for, but take a look if you are looking for a book review style view of it. - Dana ----- Original Message ----- From: "Greenarrow 1" <[EMAIL PROTECTED]> To: "sc-l" <[EMAIL PROTECTED]> Sent: Wednesday, November 10, 2004 6:11 PM Subject: [SC-L] Exploiting Software: How to Break Code
Does anyone have any comments about this book? I have read some reviews but it is on the site advertising the book for sale They stated that this book is a must for anyone wanting to harden code in programs, softwares and hardwares but then that could just be a sales pitch. I would like to see some posts both pro and con about this book. Exploiting Software: How to Break Code By Greg Hoglund, Gary McGraw. Published by Addison Wesley Professional Regards, George Greenarrow1 InNetInvestigations-Forensics
---------------------------------------------------------------------------- This electronic message transmission contains information that may be confidential or privileged. The information contained herein is intended solely for the recipient and use by any other party is not authorized. If you are not the intended recipient (or otherwise authorized to receive this message by the intended recipient), any disclosure, copying, distribution or use of the contents of the information is prohibited. If you have received this electronic message transmission in error, please contact the sender by reply email and delete all copies of this message. Cigital, Inc. accepts no responsibility for any loss or damage resulting directly or indirectly from the use of this email or its contents. Thank You. ----------------------------------------------------------------------------
Current thread:
- Exploiting Software: How to Break Code Greenarrow 1 (Nov 10)
- Re: Exploiting Software: How to Break Code Dana Epp (Nov 11)
- <Possible follow-ups>
- RE: Exploiting Software: How to Break Code Wall, Kevin (Nov 11)
- Re: Exploiting Software: How to Break Code Gary McGraw (Nov 11)
- RE: Exploiting Software: How to Break Code Gary McGraw (Nov 11)