Lists the dangerous hacks & exploits specific to networks, & presents the anatomy of these attacks including how to make your system more secure. This book
Includes:: attacks such as: Denial of Service; War Dialing; Penetration ' Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; &, Password Replay.