Offers coverage of some of the most devastating hacks & how to prevent them. Using the authors' methodology, this book reveals how to locate & patch system vulnerabilities. It also covers ISO images, wireless & RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, & mobile devices.