This is not a book on how to hack, nor is it a book about pirates. It is not a tired rehashing of some step-by-step guide on how to break into systems, or a lightning tour of hacking tools of the trade. The reader is presumed to know these basic ideas, and is instead treated to a collection of case studies and examples of some of the more novel and interesting types of cyber attacks seen today.
The writing style is abysmal, as in "extremely bad or appalling" (not as in "very deep"). But, that tends to be a frequent criticism of hacking and computer security books in general, because generally hackers and security professionals aren't exactly scholars, or even usually very bright. The book could also have been made about half as long had the unnecessary screen shots of totally mundane log in screens been avoided.
The sections on web attacks and blended threats had depth and provoked some thought. Sometimes the authors treat you to some snippet of code that does one thing or another and that's helpful, but this is not a book about how to write shell scripts or exploits. It is also not a comprehensive survey of cybersecurity issues (nor is it meant to be), nor does it teach you how to command the high seas, board and seize a ship, or walk with a pegleg -- this text is a place to get a couple of ideas selected from a small patch of the cyber attack surface.