Part 1: Protecting the Network – Technologies, Protocols, Vulnerabilities, and Tools
Upon completion of this part, readers will understand the structure of data network protocols and devices, understand breaches, and be familiar with the attacking tools and scripts that take advantage of these breaches.
This part of the book comprises the following chapters:
Get Network Protocols for Security Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.