Foreword

I have been publicly involved with computer and software vulnerabilities in one form or another for more than a decade. In nonpublic capacities it seems that I have been involved with them, computer and otherwise, all my life. There were the early advisories that I published through the LOpht. There were reports that were sent to the government. There were offensive and defensive tools released, ranging from LOphtCrack to Anti-Sniff to SLINT, as well as private tools and tools for work only. Protecting high-profile networks, both large and small, was routine. Being tasked with breaking into well-defended enclaves was even more routine. But looking at any of these elements by themselves conveys little information. It was, and is, the understanding ...

Get Network Security Assessment: From Vulnerability to Patch now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.