စာအုပ်ပါအချက်အလက်များအနည်းငယ်ဖော်ပြချက်
(1)Up and Running with BackTrack
(2)Customizing BackTrack
(3)Information Gathering
(4)Vulnerability Identification
(5)Exploitation
(6)Privilege Escalation
(7)Wireless Network Analysis
(8)Voice over IP(VoIP)
(9)Password Cracking
(10)BackTrack Forensics
