Offers an understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers, and provides a discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data [...]