Targeted attack and determined human adversaries (DHA) have changed the information security game forever. Writing secure code is as important as ever; however, this satisfies only one piece of the puzzle. Effective defense against targeted attack requires IT professionals to understand how attackers use - and abuse - enterprise design to their advantage.
Learn how advanced attackers break into networks. Understand how attackers use concepts of access and authorization to jump from one computer to the next. Dive into how and why attackers use custom implants and backdoors inside an enterprise. Be introduced to the concept of service-centric design - and how it can help improve both security and usability.
To defend against hackers you must first learn to think like a hacker.
Giving this book 3 stars is a bit generous. It reads more like a wiki page instead of a book, and honestly I would have never read it if I knew this. One good thing is it was really short and I didn't waste too much time on it.
I did read the audiobook and I suspect the eBook or physical book will be better, probably much better, as I was not a fan of the narrator.