About the Book:
The book in general is about network security with the operating systems such as Linux and Unix. In my opinion, this book reference will be really helpful for those students who study c335 Network Security as it addresses most of the issues in that module. The book itself is divided into three parts: Hacking Techniques and Defenses, Host Hardening and Special Topics
Part 1: Hacking Techniques and Defenses
In this part, the reader will get to know what intrusion tactics do hackers use to break into computer networks. One of the tools used for footprinting is nmap which can scan hosts on the network with an amazing speed. With nmap and its various commands we wil know what ports and opened on the host and know what operating system is running on that box.