NOTE: CentOS Enterprise Linux is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux.
This part provides an overview of the theory and practice of
security assessment. From network monitors to cracking tools, an
administrator can learn more about securing a system and a network
by cracking into it.