. "As we understand how they think and act, it helps us write and maintain a higher level of security within applications or network infrastructure.This book is very interesting to read and amazing to see how easy it is to hack various kinds of applications with just a few tools." . . .