This document provides an overview and table of contents for a book about attack simulation and threat modeling. It discusses setting up a virtual lab using tools like VMware and VirtualBox to simulate attacks. It also covers using intrusion detection systems like Snort to detect attack signatures, and using honeypots and honeynets to further study attacks. The book aims to explore alternative analytic techniques from other disciplines to extract valuable security data and support research, including behavioral analysis, attack correlation, and pattern recognition techniques like data mining.