I bought this book in excitement from that the first book brought me. After reading the first two chapters, I was already thoroughly disappointed. The rest of the book didn't improve much as I went on. Pages after pages of repetitive logs, which only illustrate some elementary facts that the server received a 'buffer overflow attack', or 'oh no! someone logged in at 3am!' (that's it!). No more details given. For anyone ever read anything about computer security, most 'challenges' posed in this book you can simply glance up the 5-pages long logs for a second and you'd be able to figure out what's going on. And that's this book, which only tells you what happened, but not how (well, mostly easily obtainable popular script-kiddie tools) and why, leaving you high and dry. You'd bemuch better get the 'Stealing the Network' serie.
A very, and i'll say it again - very intresting book. Just like the first one it's well writen and well organised. Material is very original, like nothing you've seen before. Of course it is a sequel, and that scares some people off. But i promise you that Hacker's Challenge 2 is nearly as good as the first one. Some sleepless nights are included in the packedge. One of the most intresting thing that i've found is a buffer overlow attack exaple. That's a very hard topic to find some good information on. Very original, won'r find it anywhere else. If you are in doubt, don'be just buy it. If you havn't read the first one get it too.