This book acts as a great resource for network administrators trying to identify their network security posture, beginners in information security who are looking to leap into their information security careers, and executives such as information security consultants and information security auditors.