Table of contents: 1. Introduction: The Chess Game Pt. I. Foundation Material 2. Case Study in Subversion 3. Know Your Opponent 4. Anatomy of an Attack 5. Your Defensive Arsenal 6. Programming 7. IP and Layer 2 Protocols 8. The Protocols Pt. II. System and Network Penetration …