TABLE OF CONTENTS
Why You Should Read This Book
Chapter 1. What is HackingChapter 2. Vulnerabilites and ExploitsChapter 3. Getting StartedChapter 4. The Hacker’s ToolkitChapter 5. Gaining Access Chapter 6. Malicious Activity and CodeChapter 7. Wireless HackingChapter 8. Your First HackChapter 9. Defensive Security & Hacker Ethics
ConclusionAbout The Author