Many existing titles provide introductions to security concepts and technologies. However, they are typically presented in the style of either academic textbooks or how to guides. A business manager, for example, will be more interested in the problems that he may face, and their impact, before being told about the technological solutions. The comprehensively researched text makes reference to many real-life examples to illustrate the points being made, which help to provide evidence of security incidents and the consequences. The book helps to answer the question of why we, particularly if working in corporate roles, should care about IT security, by presenting examples of how insecure systems can be open to exploitation. The aim is to instil readers with a sense of security awareness and foster a more security-conscious IT culture. The text does not focus upon the technological solutions required it instead concentrates upon the variety of possible vulnerabilities and the likely consequences.