Conventions Used in This Book
This book follows a few typographical and stylistic conventions:
New terms are set in italic the first time they are introduced.
Each chapter concludes with key terms that have been introduced within the chapter.
Whenever possible, we reference the Common Vulnerabilities and Exposures (CVE) database to enable you to obtain additional information about the vulnerabilities; for example, http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0965.
This book also contains the following elements for additional information, such as notes, tips, cautions, and sidebars.
Note
Notes provide additional information about a topic.
Tip
Tips provide information that can make a task easier or ease an administrative burden.
Caution ...
Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.