In a presentation that focuses on methodologies rather than tools, this book walks readers through how different attacks are performed and what counter measures exist for them.