Offers an understanding of how to effectively protect computer networks. This book describes the tools & penetration testing methodologies used by ethical hackers, & provides a discussion of what & who an ethical hacker is & how important they are in protecting corporate & government data from cyber attacks.