Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,06
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 70,95
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 72,17
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2012
ISBN 10: 3642195881 ISBN 13: 9783642195884
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 75,92
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2011 edition. 195 pages. 9.00x6.00x0.50 inches. In Stock.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2011
ISBN 10: 3642243711 ISBN 13: 9783642243714
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 81,40
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 2011 edition. 546 pages. 8.43x5.85x0.73 inches. In Stock.
Sprache: Englisch
Verlag: Springer-Verlag New York Inc, 2019
ISBN 10: 3319886371 ISBN 13: 9783319886374
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 95,55
Anzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. reprint edition. 184 pages. 9.25x6.10x0.47 inches. In Stock.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 102,41
Anzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Sprache: Englisch
Verlag: Springer Berlin Heidelberg, 2011
ISBN 10: 3642195881 ISBN 13: 9783642195884
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the thoroughly refereed post-workshop proceedings of the 7th International Workshop on Web Services and Formal Methods, WS-FM 2010, held in Hoboken, NJ, USA, in September 2010. The 11 revised full papers presented together with one invited paper were carefully reviewed and selected from 26 submissions. The papers feature topics such as web services; service oriented computing; cloud computing; formal methods; verification specification; testing; and business process management.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2019
ISBN 10: 3319886371 ISBN 13: 9783319886374
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book discusses automated string-analysis techniques, focusing particularly on automata-basedstatic string analysis. It covers the following topics: automata-basesstring analysis, computing pre and post-conditions of basic stringoperations using automata, symbolic representation of automata, forwardand backward string analysis using symbolic automata representation,constraint-based string analysis, string constraint solvers, relational stringanalysis, vulnerability detection using string analysis, string abstractions,differential string analysis, and automated sanitization synthesis usingstring analysis. String manipulation is a crucial part of modern software systems; forexample, it is used extensively in input validation and sanitization and indynamic code and query generation. The goal of string-analysis techniques and this bookis to determine the set of values that string expressions can take duringprogram execution. String analysis can be used to solve many problems inmodern software systems that relate to string manipulation, such as: (1)Identifying security vulnerabilities by checking if a security sensitivefunction can receive an input string that contains an exploit; (2) Identifyingpossible behaviors of a program by identifying possible values fordynamically generated code; (3) Identifying html generation errors bycomputing the html code generated by web applications; (4) Identifyingthe set of queries that are sent to back-end database by analyzing the codethat generates the SQL queries; (5) Patching input validation andsanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the stringanalysis problem precisely (i.e., it is not possible to precisely determine theset of string values that can reach aprogram point). However, one cancompute over- or under-approximations of possible string values. If theapproximations are precise enough, they can enable developers todemonstrate existence or absence of bugs in string manipulating code.String analysis has been an active research area in the last decade,resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security,software verification, formal methods, software engineering and program analysis. Advancedlevel students or instructors teaching or studying courses in computer security, software verification or program analysis willfind this book useful as a secondary text.
Taschenbuch. Zustand: Neu. String Analysis for Software Verification and Security | Tevfik Bultan (u. a.) | Taschenbuch | ix | Englisch | 2019 | Springer | EAN 9783319886374 | Verantwortliche Person für die EU: Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg, juergen[dot]hartmann[at]springer[dot]com | Anbieter: preigu.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 137,13
Anzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 174 pages. 9.25x6.25x0.75 inches. In Stock.
Zustand: Sehr gut. Zustand: Sehr gut | Seiten: 532 | Sprache: Englisch | Produktart: Bücher | Keine Beschreibung verfügbar.
Sprache: Englisch
Verlag: Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3319686682 ISBN 13: 9783319686684
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Buch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book discusses automated string-analysis techniques, focusing particularly on automata-basedstatic string analysis. It covers the following topics: automata-basesstring analysis, computing pre and post-conditions of basic stringoperations using automata, symbolic representation of automata, forwardand backward string analysis using symbolic automata representation,constraint-based string analysis, string constraint solvers, relational stringanalysis, vulnerability detection using string analysis, string abstractions,differential string analysis, and automated sanitization synthesis usingstring analysis. String manipulation is a crucial part of modern software systems; forexample, it is used extensively in input validation and sanitization and indynamic code and query generation. The goal of string-analysis techniques and this bookis to determine the set of values that string expressions can take duringprogram execution. String analysis can be used to solve many problems inmodern software systems that relate to string manipulation, such as: (1)Identifying security vulnerabilities by checking if a security sensitivefunction can receive an input string that contains an exploit; (2) Identifyingpossible behaviors of a program by identifying possible values fordynamically generated code; (3) Identifying html generation errors bycomputing the html code generated by web applications; (4) Identifyingthe set of queries that are sent to back-end database by analyzing the codethat generates the SQL queries; (5) Patching input validation andsanitization functions by automatically synthesizing repairs illustrated in this book. Like many other program-analysis problems, it is not possible to solve the stringanalysis problem precisely (i.e., it is not possible to precisely determine theset of string values that can reach aprogram point). However, one cancompute over- or under-approximations of possible string values. If theapproximations are precise enough, they can enable developers todemonstrate existence or absence of bugs in string manipulating code.String analysis has been an active research area in the last decade,resulting in a wide variety of string-analysis techniques. This book will primarily target researchers and professionals working in computer security,software verification, formal methods, software engineering and program analysis. Advancedlevel students or instructors teaching or studying courses in computer security, software verification or program analysis willfind this book useful as a secondary text.