The book collects 3 years of researches in the penetration testing security field. It does not describe underground or fancy techniques, it is most focused on the state of the art in penetration... More > testing methodologies. In other words, if you need to test a system, how do you do ? What is the first step ? What tools can be used ? what is the path to follow in order to find flaws ?
The book shows many real world examples on how the described methodology has been used. For example: penetration testing on electronic voting machines, how malware did use the describe methodology to bypass common security mechanisms and attacks to reputation systems.< Less