(Who might benefit from reading this book? If you are a computer security professional trying to secure your organization’s information systems against attacks, you will benefit from the points made. If you are a manager responsible for securing information systems, you will benefit from this book. If you are an attacker, hopefully a white hat kind of attacker, you will benefit from this book, especially the chapters covering the offensive areas of war. I know that this last point can be controversial, but, as defenders, we absolutely must know how an attacker could go about compromising our information systems! If we do not know how an attack might take place, we cannot defend against that attack. So, yes, there are points made in this book which are solely of benefit to an attacker.)