Empowers network and system administrators to defend their information and computing assets. This guide presents explanations of destructive hacker tools and tactics - and specific counter measures... This description may be from another edition of this product.