Download now Free registration required
At first blush, the security of software appears to be something intrinsic, like thread to fabric or yeast to bread. First, methods to exploit how the software works are evolving and what may have been an acceptable behavior may now represent a serious weakness that needs to be addressed. The second is that the environment in which software operates is constantly changing, what may have been a functioning, relatively secure application under one operating system version may be vulnerable in the next. Third, the context in which software is deployed is vastly different depending on how it's used and how it interacts with other software, hardware or data.
- Format: PDF
- Size: 240.3 KB