A practical guide to simulating, detecting, and responding to network attacks. This book offers steps on how to emulate an outside attacker in order to assess the security of a network. Focusing on penetration testing, it includes information about liability issues and ethics as well as procedures and documentation.