finding vulnerabilities in networks chapter 4 2550966