Abstract
The evolution of network computing environments – including the increased use of mobile, cloud, and virtual infrastructure – has created a continuous stream of new attack vectors for adversaries to prey on. Regardless of the tactics used, most breaches comprise some exploitation of software vulnerabilities or system configuration settings.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsAuthor information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Morey J. Haber, Brad Hibbert
About this chapter
Cite this chapter
Haber, M.J., Hibbert, B. (2018). Making It All Work. In: Asset Attack Vectors. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3627-7_21
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3627-7_21
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3626-0
Online ISBN: 978-1-4842-3627-7
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books