Exploiting Software How To Break Code How does software break? How do attackers make software break on purpose? Why are firewalls, intrusion detection systems, and antivirus software not k