Who this book is for

This book provides background information to help readers understand the topics that are discussed. The intended audience for this book includes the following:

  • Network/system administrators
  • Security consultants and IT officers
  • Architects/protocol developers
  • White Hat hackers