Thisbookisforanyoneinterestedinlearningthetechniquesthatthemoresophisticatedattackersareusingtoday.Otherbooksonthetopichavethehabitofrehashinglegacyattackandpenetrationmethodologiesthatarenolongerofanyusetocriminals.Ifyouwanttolearnhowthetechniquescriminalsusetodayhaveevolvedto