| | Exploiting Software : How to Break CodeHow does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not keeping out the bad guys? What tools can be used to break software? This book provides the answers. Exploiting Software is loaded with examples of real attacks, attack patterns, tools,... | | Lean Connections: Making Information Flow Efficiently and EffectivelyAchieve effective information flow through the extended value stream to the end customer
Dependable information flow is a necessary prerequisite to the successful implementation of lean production principles. But while most managers understand how to make materials and manpower flow, the flow of information tends to be much... |