Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
22 Security De-engineering
and there could have been as many as twenty miniprojects underway
simultaneously.
I mentioned in the previous paragraph about the miniprojects and
“may or may not have anything to do with ongoing business inter-
ests.” Actually, from the view of the Hacker, the activities “absolutely
were totally” related to business interests, and I could sympathize
with this viewpoint in most cases. Managers, however, were in many
cases at odds with the Hackers’ views (more on that in various later
chapters).
e Hackers’ computers invariably either ran FreeBSD or some
Linux variant as an operating system, and the machines were cong-
ured in VGA console mode. is was essentially a display conguration
with no graphical user interface ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355