Readers learn the differences among white hat, black hat, and gray hat hackers and their ways of working concerning computer networks today.