Well, hacks to network hacks to operating system hacks. What I haven't yet covered are the applications that run on top of all of this and the storage systems that keep everything intact.
The first chapter in this part covers various messaging hacks and countermeasures affecting e-mail, instant messaging, and Voice over IP (VoIP) systems. Next, this part looks at Web application exploits, along with some countermeasures to secure them from the elements. It then goes deeper into application hacking using Google and its searching capabilities. Finally, this part covers attacks against storage systems. It covers both unstructured data, otherwise known as network files, and structured data found in various database systems.