Chapter 12. Conclusion

 

The end of a matter is better than its beginning, and patience is better than pride.

 Ecclesiastes 7:8 (NIV)

Designing and implementing a truly secure program is actually a difficult task on Unix-like systems such as Linux and Unix. The difficulty is that a truly secure program must respond appropriately to all possible inputs and environments controlled by a potentially hostile user. Developers of secure programs must deeply understand their platform, seek and use guidelines (such as these), and then use assurance processes (such as inspections and other peer review techniques) to reduce their programs' vulnerabilities.

In conclusion, here are some of the key guidelines in this book:

mirror server hosted at Truenetwork, Russian Federation.