13 The Future, References, and Conclusions
The world of computer attack tools and techniques is like a DVD player stuck in fast forward, running at quadruple speed, with profound new vulnerabilities being discovered on an almost daily basis. Powerful and ever-easier-to-use attack tools are likewise constantly being released. Where will this all lead in the future? How can you keep up with the onslaught? This chapter tackles these questions.
Where Are We Heading?
As we have seen throughout this book, the systems, applications, and communications protocols in use today have a variety of vulnerabilities. Many vendors hype their latest release, but short-circuit true security testing in an effort to get software quickly out the door to grab market ...
Get Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.