As I have noticed over the years, spoon-fed information on anything that involves network auditing, or anything of the sort, has been rather scarce. It is for this reason that my book has spawned in its current form. The idea is to prove that such tasks may be explained in an articulate manner, while still maintaining a proper rapport with the reader. People tend to speak in lofty tongue when they have a superiority complex; I eliminate this completely by drawing back the verbal curtain and cutting straight to the point. This is done by speaking in layman’s terms, while still maintaining proper terminology when necessary, and utilizing metaphors to express the idea in a more descriptive form. As you may have guessed, this is a network auditor’s quick-reference bible. Not only does it contain step-by-step, illustrated tutorials, but an explanation as to why each exploitation works, and how to defend against such attacks. One might also discover a few “rants and... More > raves,” as well as other random nuances.< Less
Lulu Staff has been notified of a possible violation of the terms of our Membership Agreement. Our agents will determine if the content reported is inappropriate or not based on the guidelines provided and will then take action where needed.
Thank you for notifying us. We will email you with the results and/or actions taken as a result of the investigation if you chose to receive confirmation.