ABSTRACT

This chapter addresses specific programming flaws as the attacker would see them and addresses strategic and tactical ways to avoid them.