Examining computer security from the hacker’s perspective, the second edition of this popular reference illustrates how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process. Written in a lab manual style, this book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It then offers information for constructing a system to defend against attacks.