This book represents the leading thought from the reverse engineering
world. The authors are tremendous people in their own right, and I trust
you and your organization will find a wealth of information that will
help prepare you for the proactive computer security frontier.