O'Reilly logo

Software Test Attacks to Break Mobile and Embedded Devices by Jon Duncan Hagar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

This book is not about pointing out specific people’s or even groups of people’s mistakes and berating them. However, we should all acknowledge that, as humans, we all make mistakes.

In building systems of any kind, mistakes can and will be made whether in requirements, design, code, hardware, and even documentation, and those mistakes equate to bugs (errors that can create failures). Perfection, after all, was never part of any stipulation or standard, though with some irony, it seems that many customers expect perfection.

The attacks in this book are meant to help ensure that whatever the system’s function, the system will work as desired by the customer or user. I hope that you will simply take my advice to run the attacks and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required