Reveals how to use, tweak, & push the popular network security applications, utilities, & tools using Windows, Linux, Mac OS X, & Unix platforms. This book offers multiple approaches to network security via 23 cross-referenced chapters that review the security tools for both black hat techniques & white hat defense tactics.