Who this book is for
This book provides background information to help readers understand the topics that are discussed. The intended audience for this book includes the following:
- Network/system administrators
- Security consultants and IT officers
- Architects/protocol developers
- White Hat hackers