With the threats of cyber terrorism and corporate espionage increasing, the need for trained network security professionals continues to grow. This book describes penetration-testing tools and techniques that ethical hackers and security testers use to protect computer networks. This book offers a structured knowledge base for preparing security professionals to discover vulnerabilities and recommend solutions for tightening network security and protecting data from potential attackers.
With the threats of cyber terrorism and corporate espionage increasing, the need for trained network security professionals continues to grow. This book describes penetration-testing tools and techniques that ethical hackers and security testers use to protect computer networks. This book offers a structured knowledge base for preparing security professionals to discover vulnerabilities and recommend solutions for tightening network security and protecting data from potential attackers.