“If popular culture has taught us anything, it is that someday mankind must face and destroy the growing robot menace.”
Daniel H. Wilson, How to Survive a Robot Uprising
The past several years have seen huge strides in computer security, particularly in the field of software vulnerabilities. It seems as though every stop at the bookstore introduces a new title on topics such as secure development or exploiting software.
Books that cover application security tend to do so from the perspective of software designers and developers and focus on techniques to prevent software vulnerabilities from occurring in applications. These techniques start with solid security design principles and threat modeling and carry all the way through to implementation ...