Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
AutomAteD VulnerAbility ScAnnerS 141
e dierence lies in the measurement of failure. If robots in car
assembly screw up, people end up in the hospital or die. For a year or
two at the start of the 2000s, Hackers tried to tell the world that full
automation in vulnerability management was a bad idea, but who was
listening? at was so long ago that anyone who was listening to the
Hackers will have forgotten their message. Now we are in a position
where we see almost daily headlines in nontech publications telling us
about corporate espionage, malware, APT, privacy violations, identity
theft, and so on.
e robots in security are not yet smart enough, and perhaps never
will be.
is same Luddite story has been repeated under dierent guises
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355