Verizona#39;s findings showed that 90 percent of vulnerabilities exploited had patches available for longer than six months. ... This has helped significantly; however, more and more code is built on code from the past. ... Usually their system has access to another system that has remote control of yet another system and so forth.
|Author||:||Doug Howard, Kevin Prince|
|Publisher||:||John Wiley & Sons - 2010-12-07|