Chapter 1 Applying Reconnaissance Techniques
Chapter 2 Analyzing the Results of Reconnaissance
Chapter 3 Responding to Network-Based Threats
Chapter 4 Securing a Corporate Network
18.223.114.142