This book provides step-by-step procedures for using mainly free commercially available tools to perform penetration testing of computer networks. It can be used by both the novice (to learn) and the
Middleton has 20-plus years of experience in the design and security of data communications networks, for federal government agencies, government contractors, and in the commercial financial sector. H
Stories of cyber attacks dominate the headlines. Whether its theft of massive amounts of personally identifible information or the latest intrustion of foreign goverments in US goverment and industria
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15
A Great Blue Heron wades in the shallows of the Potomac River, scanning for unsuspecting prey. Sunlight turns the water translucent as a small school of fish rises to the water's surface. The heron st