Explains how to defend against vulnerabilities in systems and underlying network infrastructure. This book features advanced methodologies that include advanced attack and defense vectors, advanced attack profiling, and the theatre of war concept. In addition, it helps readers architect and prepare their network from threats that don't yet exist.
Bio de l'auteur
Sommaire / contenu