An insider's guide to auditing software security. It uncovers vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. It covers the software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of various sizes and functions.