Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
How Security cHangeD PoSt 2000 95
best practices are exactly that—they are the best practices known to
mankind, the ultimate authority.
Like so many other facets of post-2000 security, the use of the phrase
“best practices” gained momentum because, just as use of automated
vulnerability scanners could be used to substitute the Hacker’s wis-
dom in vulnerability testing, “best practices” could be used to negate
the need for any further or deeper analysis in most other areas of
security. e skill sets required to go deeper and really assess the pros
and cons of whatever practice is being prescribed (at a practical IT
level, with boring, nonchatty Unix consoles and MS-DOS prompts)
were no longer necessary because the best practice was already ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355