pt. I. Building the foundation for security testing -- pt. II. Putting security testing in motion -- pt. III. Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. VI. Security testing aftermath -- pt. VII. The part of tens.
Summary
Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!