In a Nutshell Understanding how an attacker can take advantage of network vulnerabilities is vital...