Describes underlying principles of hacker attacks and offers advice on securing networked systems, security checklists for common scenarios, theoretical background information, and real world examples of actual attacks.