This easy-to-use guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT infrastructures and the Internet. For each of the 30 common software vulnerabilities featured, there is a summary, description of how the vulnerability occurs, and famous examples of how it has been used.
Read More
This easy-to-use guide focuses on the origin of most software vulnerabilities, including the bugs in the underlying software used to develop IT infrastructures and the Internet. For each of the 30 common software vulnerabilities featured, there is a summary, description of how the vulnerability occurs, and famous examples of how it has been used.
Read Less