I just got done reading this book and I was quite impressed. I've read many other books on the same subjects and this handbook delivers the material without all the fluff. It shows the most popular (some of the most effective) tools and how they are used. I really love Ch. 6 about the "Insider Attacks" as it shows from start to finish how an attacker could leverage themselves as a domain admin with relative ease. While there are books alone written for each chapter this handbook sums each chapter up in a clear concise way especially if you are already a bit familiar with the tools and techniques. I would say that this book isn't written for a novice or someone who hasn't already have great understand of basic networking (TCP/IP) or systems experience.
There are excellent chapters about exploits, shellcodes and how to write and use them as well as some excellent examples of each. As with any book like this it is important to practice the techniques in a lab to have the info "stick". Overall, one of the more interesting books I've read that is not like the typical chapters you would see in a book related to becoming a "Certified Ethical Hacker".