This book is intended for people who want to know more about data security. In particular, it targets people who want to understand why they use a particular tool when they do, as opposed to those people who throw as many tools as possible at a system to see if an exploit will happen. My goal is for the readers to develop their own method and approach to effective penetration testing, which will allow them to experiment and learn as they progress. I believe that this approach is the only effective way to understand how malicious people attack data systems, and therefore, the only way to understand how to mediate vulnerabilities before they can be exploited.
If you are a security professional, penetration tester, or just have an interest in the security of complex data environments, this book is for you.