I make a few assumptions about you, aspiring information-security person:
You're familiar with basic computer-, network-, and information-securityrelated
concepts and terms.
You have a basic understanding of what hackers do.
You have access to a computer and a network on which to test these
techniques.
You have access to the Internet in order to obtain the various tools used
in the ethical hacking process.
You have permission to perform the hacking techniques in this book.
No comments:
Post a Comment