Conventions Used in This Book

This book follows a few typographical and stylistic conventions:

  • New terms are set in italic the first time they are introduced.

  • Each chapter concludes with key terms that have been introduced within the chapter.

  • Whenever possible, we reference the Common Vulnerabilities and Exposures (CVE) database to enable you to obtain additional information about the vulnerabilities; for example, http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0965.

  • This book also contains the following elements for additional information, such as notes, tips, cautions, and sidebars.

Note

Notes provide additional information about a topic.

Tip

Tips provide information that can make a task easier or ease an administrative burden.

Caution ...

Get Inside Network Security Assessment: Guarding Your IT Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.