Skip to Main Content
Maximum Security, Third Edition
book

Maximum Security, Third Edition

by Anonymous
May 2001
Intermediate to advanced content levelIntermediate to advanced
896 pages
21h 11m
English
Que
Content preview from Maximum Security, Third Edition

Chapter 25. Mining the Data Monster

In This Chapter

Computer security is a process, not a product. The process is constant, and not following it can prove disastrous. Generally speaking, the security process goes something like this:

  1. After configuring your system as securely as possible with help from resources discussed in this chapter, you, or some other party, discover a vulnerability.

  2. An exploit for that vulnerability becomes public knowledge.

  3. Your system's vendor responds, typically with a patch or upgrade.

  4. By staying on top of alerts posted by vendors and security organizations, you learn ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Maximum Security, Fourth Edition

Maximum Security, Fourth Edition

Anonymous

Publisher Resources

ISBN: 0672318717Purchase book