October 2022
Intermediate to advanced
288 pages
8h 37m
English
This chapter covers
We can’t measure or manage risk unless we know about the vulnerabilities in our own software and systems. To do this, we need accurate, timely, and actionable data on vulnerabilities, which means a lot of testing. In the first part of the book, we learned how attackers will exploit some common physical and virtual vulnerabilities. Now let’s learn about the different ways we can find these vulnerabilities ourselves, before ...