Key concepts in this chapter are:
Analyzing the arms race between hackers and security developers
Evaluating future trends
It’s a warm sunny afternoon in the seaside forest bordering a beach in beautiful Costa Rica. The year is 2020. A robot monkey descends from the branches of a tree and offers you a cool drink. You lie back in your hammock, stretching after a long pleasant snooze. You sip the delicious cool drink and send the robot monkey to find some snacks as you switch on a satellite-linked Tablet PC and begin connecting to the headquarters of your global empire. Twenty years ago, people laughed when you began selling miniature plastic dinosaurs from a van somewhere in western Washington, but who’s laughing now? Those ...