Examines where security holes come from, how to discover them, how hackers exploit them and take control of systems on a daily basis, and most importantly, how to close these security holes so they never occur again   A unique author team-a blend of industry and underground experts- explain the tech