Showingyouhowonlinecriminalsperformreconnaissance,gainaccess,stealdata,andpenetratevulnerablesystems,thisbookcoversallhardware-specificandnetwork-centeredsecurityissuesaswellascountermeasuresandimplementationtechniques.