After reading this chapter and completing the exercises, you will be able to do the following:
Understand the basic techniques used by hackers.
Be able to formulate strategies to defend against common attacks.
Understand how to use some hacking tools.
This book is about network defense. However, I am a strong proponent of the idea that you should “know your enemy.” Put another ...