ABSTRACT

After all the techniques and background information, this is the chapter that really focuses on the reason why this book was written — teaching you how to develop a plan with which to conduct security testing on your system.