With the threats of cyber terrorism and corporate espionage increasing, the need for trained network security professionals continues to grow. This book describes penetration-testing tools and techniques that ethical hackers and security testers use to pr