1 research outputs found

    Encapsulating Rules of Prudent Security Engineering

    No full text
    In practice, security of computer systems is compromised most often not by breaking dedicated mechanisms (such as security protocols) , but by exploiting vulnerabilities in the way they are employed
    corecore