Penetration testers, security experts, network and system administrators, as well as hackers, will all find this book to be very useful.
1-Explains the strategies employed by hostile attackers in real-world circumstances
2-Gets inside a ninja's head to describe unconventional penetration testing procedures.
3-Extends current penetration testing approaches and introduces fresh hardware and physical attack strategies