September 2004
Intermediate to advanced
352 pages
11h 44m
English
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security.