(【Author】Niu Shaozhang, Jiang Weiqiang 【Press】University of Posts and Telecommunications History 1.2 Memories and Evolution of Network Attack Technology 1.3 Current Situation and Development of Network Security Technology Chapter 2 Network Attack and Prevention and Methods The game with defense Chapter 3 Network attack and defense model 3.1 Overall model description of network attack 3.2 The principle and model of network defense 3.3 The overall plan for the construction of network attack and defense training methods Chapter 4 Network attack Chapter 4 Obtaining program system information 4.1 4.2 Basic tools to obtain network information 5.4 Analysis of Several Common Vulnerabilities 5.5 Vulnerability Library and Its Use 5.6 Process and Methods of Fault Discovery 5.7 Tools for Obtaining System Faults 5.8 Experiment: Vulnerability Scanning Chapter 6 Network Attack Identity Spoofing 6.1 IP Spoofing Attack 6.2 IP Protocol Related spoofing techniques 6.3 Other identity spoofing techniques 6.4 Experiment: ARP spoofing Chapter 7 Cyberattack Hiding Chapter 7)