Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
42 Security De-engineering
information, and to be honest, even the most astute and security-aware
can at least be embarrassed or inconvenienced. e main dierence is
only with the attention that comes from a user base of half a billion
people, all of whom enter personal details. In fact, the ideas here are
similar to those in the old argument about malware and Windows
versus Mac. Windows can seem to be more vulnerable to these mal-
ware issues, but one needs to remember that Windows is still far more
widespread (I did not say “popular”) as compared with Mac—and
therefore more juicy a platform from which to seek unlawful nancial
gains. As Mac gets more widespread in homes and oces, no doubt
there will be proportionally more malware issues ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355