This book serves as a complete reference for information security including IT security, data security, network security, internet security, penetration testing, cryptography and laws governing the industry. The book describes the tools and penetration testing methodologies used by ethical hackers and provides a discussion of what and who an ethical hacker is and what role he plays in protecting corporate and government data from cyber attacks. It also offers an ...