Getting to the Root of Software Security

[magazine]
Volume-Issue: 
2004-08
Article Summary: 

Vendors try to protect their source code from would-be attackers, but it takes only one chink in the armor for a good reverse engineer to penetrate all the defenses so carefully put in place. Find out how to methodically uncover patterns to help you predict where the attacks will be focused and how they will be carried out.