What’s Next?

Practical Security — Pragmatic Programmers (21 / 46)

👈 Suggested Reading | TOC | Don’t Roll Your Own Crypto 👉

As we look back on the vulnerabilities we covered in this chapter, we see two main classes of vulnerabilities. In the first, an attacker is able to inject code of their own choosing into the system. In the second, operators accidentally leave the system in an insecure state. Interestingly, the defense for both looks fairly similar. First we make a one-time effort to find the vulnerabilities and fix them. We then layer on automated…

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
The Pragmatic Programmers

The Pragmatic Programmers

We create timely, practical books and learning resources on classic and cutting-edge topics to help you practice your craft and accelerate your career.