ABSTRACT

In the introduction and also the previous two chapters I have written briefly regarding changes in security over the past decade and more, I have introduced the security professionals involved: the Hacker and the Hacker’s successor-the CASE.