Hands-On Ethical Hacking and Network Defense   Chapter 3 Network and Computer Attacks 