Chapter 1 Introduction to Network Protection
Chapter 2 Anatomy of a Hack: The Rise and Fall of Your Network
Chapter 3 Rule Number 1: Patch Your Systems