£108.62

Springer - Value-Range Analysis of C Programs Book

Price data last checked 26 day(s) ago - will refresh soon

View at Amazon

Price History & Forecast

Last 65 days • 65 data points (No recent data available)

Historical
Generating forecast...
£108.62 £106.66 £107.09 £107.52 £107.94 £108.37 £108.80 26 January 2026 11 February 2026 27 February 2026 15 March 2026 31 March 2026

Price Distribution

Price distribution over 65 days • 2 price levels

Days at Price
Current Price
11 days 54 days · current 0 14 27 41 54 £107 £109 Days at Price

Price Analysis

Most common price: £109 (54 days, 83.1%)

Price range: £107 - £109

Price levels: 2 different prices over 65 days

Description

Buffer overflows remain one of the most widespread security vulnerabilities in modern computing. When input is written into a memory buffer that is not large enough to hold that input, it can allow a malicious person to gain control over a computer system. By using crafted input, attackers can trick defective programs into executing code encoded within the input itself. This book from Springer addresses these critical security threats by describing a static analysis method. The text focuses on a technique that aims to prove the absence of buffer overflows in C programs. While many workarounds like new processor features have been proposed to contain these threats, this work provides a specialized approach through conservative analysis. It is an essential resource for those studying computer science architecture and software security to understand how to identify and prevent memory-based vulnerabilities in C programming.

Key Features

Provides a detailed description of static analysis methods designed to prove the absence of buffer overflows in C programs.

Explains how buffer overflows occur when input exceeds the capacity of a memory buffer, leading to potential system control.

Addresses the security risks where crafted input can trick defective programs into executing unauthorized encoded code.

Covers the limitations of current workarounds, such as new processor features, in containing buffer overflow threats.

Offers a conservative analysis approach to help identify and mitigate widespread security vulnerabilities in software.

Product Specifications

Format
paperback
Domain
Amazon UK
Release Date
15 May 2011
Listed Since
01 October 2010

Barcode

No barcode data available

Similar Products You Might Like

String Analysis for Software Verification and Security
93% match

String Analysis for Software Verification and Security

Springer

£64.63 28 Feb 2026
Advanced Symbolic Analysis for Compilers: New Techniques and Algorithms for Symbolic Program Analysis and Optimization: 2628 (Lecture Notes in Computer Science, 2628)
92% match

Advanced Symbolic Analysis for Compilers: New Techniques and Algorithms for Symbolic Program Analysis and Optimization: 2628 (Lecture Notes in Computer Science, 2628)

Springer

£44.99 07 Mar 2026
Verification of Sequential and Concurrent Programs (Texts in Computer Science)
92% match

Verification of Sequential and Concurrent Programs (Texts in Computer Science)

Springer

£63.14 24 Feb 2026
The Art of C Programming
92% match

The Art of C Programming

Springer

£70.21 13 Jan 2026
Shape Analysis (Foundations and Trends® in Programming Languages)
92% match

Shape Analysis (Foundations and Trends® in Programming Languages)

Now Publishers Inc

Out of Stock 06 Mar 2026
'C' Programming in an Open Source Paradigm: A Hands on Approach (River Publishers Series in Information Science and Technology)
91% match

'C' Programming in an Open Source Paradigm: A Hands on Approach (River Publishers Series in Information Science and Technology)

Taylor & Francis

£63.64 08 Mar 2026
Secure Programming Cookbook for C & C++ (Cookbooks Ser.)
91% match

Secure Programming Cookbook for C & C++ (Cookbooks Ser.)

O'Reilly

£34.35 08 Jan 2026
A Programmer's Companion to Algorithm Analysis
91% match

A Programmer's Companion to Algorithm Analysis

CRC Press

£67.15 08 Mar 2026
MALicious softWARE: Omnibus
91% match

MALicious softWARE: Omnibus

£81.39 25 Jan 2026
MALicious softWARE: Omnibus
91% match

MALicious softWARE: Omnibus

£98.12 31 Jan 2026
Springer Advances in Cyber Security - Principles and Techniques
91% match

Springer Advances in Cyber Security - Principles and Techniques

Springer

£94.25 15 Apr 2026
Springer - Security in Computing Systems Monograph
91% match

Springer - Security in Computing Systems Monograph

Springer

£114.94 19 Apr 2026
Security and Policy Driven Computing
91% match

Security and Policy Driven Computing

CRC Press

£140.40 01 Apr 2026
A Programmer's Companion to Algorithm Analysis
91% match

A Programmer's Companion to Algorithm Analysis

CRC Press

£170.21 06 Mar 2026
The Continuing Arms Race: Code-Reuse Attacks and Defenses (ACM Books)
91% match

The Continuing Arms Race: Code-Reuse Attacks and Defenses (ACM Books)

Morgan & Claypool

£54.87 12 Mar 2026
C by Example: 29 (Cambridge Computer Science Texts, Series Number 29)
91% match

C by Example: 29 (Cambridge Computer Science Texts, Series Number 29)

Cambridge University Press

£56.12 12 Feb 2026
The Verilog Hardware Description Language
91% match

The Verilog Hardware Description Language

Springer

£71.99 08 Jan 2026
Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting: 78 (Advances in Information Security, 78)
91% match

Binary Code Fingerprinting for Cybersecurity: Application to Malicious Code Fingerprinting: 78 (Advances in Information Security, 78)

Springer

£105.73 18 Apr 2026
Software Reverse Engineering: Navigating x86 Windows Applications with Ghidra
91% match

Software Reverse Engineering: Navigating x86 Windows Applications with Ghidra

£42.63 26 Feb 2026
Springer Binary Code Fingerprinting for Cybersecurity Book
91% match

Springer Binary Code Fingerprinting for Cybersecurity Book

Springer

£109.76 06 Mar 2026
CERT® C Coding Standard, Second Edition, The: 98 Rules for Developing Safe, Reliable, and Secure Systems (SEI Series in Software Engineering)
91% match

CERT® C Coding Standard, Second Edition, The: 98 Rules for Developing Safe, Reliable, and Secure Systems (SEI Series in Software Engineering)

ADDISON-WESLEY

£43.99 25 Feb 2026
Springer Cyberspace Mimic Defense - Wireless Network Security
91% match

Springer Cyberspace Mimic Defense - Wireless Network Security

Springer

£136.00 18 Apr 2026
Introduction to SystemVerilog
91% match

Introduction to SystemVerilog

Springer

£99.11 05 Feb 2026
Pointers in C Programming: A Modern Approach to Memory Management, Recursive Data Structures, Strings, and Arrays
91% match

Pointers in C Programming: A Modern Approach to Memory Management, Recursive Data Structures, Strings, and Arrays

Apress

£42.49 09 Feb 2026