上QQ阅读APP看书,第一时间看更新
Who this book is for
This book is intended for the following users:
- Information technology professionals
- Information security professionals
- Casual security or technology enthusiasts
The book assumes that the reader has little to no familiarity with penetration testing, Linux, scripting, and TCP/IP networking. Each section in this book initially addresses the underlying principles, prior to discussing the techniques that employ them.