Content of the book includes : 1. Footprinting; 2. Scanning; 3. Enumeration; 4. Hacking windows 95/98 and ME; 5. Hacking windows NT; 6. Hacking windows 2000; 7. Novell netware hacking; 8. Hacking UNIX; 9. Dial-Up, PBX, Voicemail and VPN hacking; 10. Network devices; 11. Firewalls; 12. Denial of service (Dos) attacks; 13. Remote control insecurities; 14. Advanced techniques; 15. Web hacking; 16. Hacking the Internet user.