Pt. I. Building the foundation for ethical hacking -- pt. II. Putting ethical hacking in motion -- pt. III. Hacking network hosts -- pt. IV. Hacking operating systems -- pt. V. Hacking applications -- pt. VI. Ethical hacking aftermath -- pt. VII. The part of tens.
Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!