Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
32 Security De-engineering
in the industry and is a matter for a later chapter in this book (please
see “e Tip of the Iceberg—Audit-Driven Security Strategy” in
Chapter 4).
e meeting in Taipei was the rst such meeting with clients that
I could remember in more than two years. One of my Hacker col-
leagues and I, together with our line manager, tried to fumble our
way through the misdirected questions from the client. Suddenly the
client was under a strict mandate to actually address the problems
raised in our report. To that point in time, they did not feel compelled
to pay attention to a complicated 200-page report.
As an example of one of the ndings from our report, Oracle’s
database management server has a service that listens for ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355