Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
checkliStS anD StanDarDS evangeliStS 67
Common CASE Assertions
ere are many assertions from CASEs that you will hear repeatedly
in some form or another.
A common scenario is one where you have several security ana-
lysts with similar time-served numbers in security—and there are one
or two analysts in the team who came from a technical background.
e CASE element in the team will proclaim themselves to be more
senior than the other contingent—they are “more of a manager,” even
though the word “management” does not appear anywhere on the list
of their roles and responsibilities.
A CASE is also often a self-proclaimed Hacker, “but I grew out of
it.” e reality, however, is usually one of, in the words of a Hungarian
former work colleague, “[ ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355