All of the code is organized into folders. For example. Following is what you need for this book: This book is for security professionals, penetration testers, system administrators, and red and blue ...