How to Break Software: A Practical Guide to Testing by James Whittaker (English)
84,21 €
Attacking Software from the File System Interface. Second Attack: Inject faults that simulate network problems. File-based Attacks. Fifth Attack: Vary file access permissions. Sixth Attack: Vary/corrupt file contents.
Jetzt bei Ebay: