This book should have been aimed at the experienced computer programmer, and IT manager. Yet the examples were so trivial, that experienced programmers would laugh. Unexperienced programmers would miss a lot of what was implied here... or how these ideas might be extended.
Supposedly, this book was aimed at the security conscious person who programs applications and must understand what the minimum security measures are to make your applications secure. But the actual useful information could have been given in a page and a half... maybe 3 pages if you included a few simple examples. The rest were examples on how some terrible person might fool innocent, unsuspecting and trusting IT people. While one might object to these ideas being revealed, the fact is that the examples presented are so amazingly simplistic that only a person who already knew how to do this stuff, would be able to make use of it.
Do I know how to do this stuff? This simple stuff. Yeah.
If you want to really understand what goes on with defending a computer site, I suggest reading, "The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage" by Cliff Stoll. It is dated, but it gives a good description of what a maze the internet really is below the level of the pretty web sites.