As I have noticed over the years, spoon-fed information on anything that involves network auditing, or anything of the sort, has been rather scarce. It is for this reason that my book has spawned in its current form. The idea is to prove that such tasks may be explained in an articulate manner, while still maintaining a proper rapport with the reader. People tend to speak in lofty tongue when they have a superiority complex; I eliminate this completely by drawing back the verbal curtain and cutting straight to the point. This is done by speaking in layman's terms, while still maintaining proper terminology when necessary, and utilizing metaphors to express the idea in a more descriptive form. As you may have guessed, this is a network auditor's quick-reference bible. Not only does it contain step-by-step, illustrated tutorials, but an explanation as to why each exploitation works, and how to defend against such attacks. One might also discover a few "rants and raves," as well as other random nuances.