This text presents practical examples which aim to show the reader how to identify and defend themself against real security threats. It includes information on how to inoculate networks against... This description may be from another edition of this product.