The document is arranged into four logical parts:
Chapter 2 introduces us to the traditional hacker and the traditional systems administrator. A discussion follows on the change that the systems administrator needs to undergo. The composite person is named a SysHackAdminer followed by a discussion of what he ``inherits'' from both ``parents''.
Chapter 3 is the beginning of the technical part of the document. It is also the first chapter to deal with security problems. Host security problems are discussed with illustrations of how they may be exploited.
Chapter 4 discusses network security problems. Here too the problems discussed are followed with illustrations of how they may be exploited.
Chapter 5 provides case studies for the two previous chapters. It serves as an illustration of how the different security problems can be exploited in real break-ins and how to use previous exploits to climb the ``ladder of privilege''.
Chapter 6 is the beginning of the solutions section of the document. Host security solutions to the problems discussed in chapter three are proposed and some applied.
Chapter 7 discusses network security solutions. The chapter also introduces us to a security mechanism that promises to improve the dismal state of network security.
Chapter 8 provides case studies for the previous two chapters. In this chapter, firewalls are charged with the responsibility of performing commonly required security tasks. This chapter is also used to point out how firewalls cope also with implementing the security solutions proposed in the previous two chapters.
Chapter 9 concludes our discussions and ties all the chapters together.