Somesoftwareisn'teffectivebecauseitprovesunabletopreventthepropagationofworms,butthisguideexamineswheresecurityholescomefrom,howtodiscoverthem,howtoprotectsystems,andhowtodoawaywithsecurityholesaltogether.