| Table of Contents |
| | CD Cracking Uncovered ”Protection against Unsanctioned CD Copying |
| | Preface |
| | Introduction |
| | On the CD |
| Part I - CD Anathomy |
| | Chapter 1 | - | CD Organization |
| | Chapter 2 | - | Power of Reed-Solomon Codes |
| Part II - Low-Level Control over Hardware |
| | Chapter 3 | - | Practical Advice on Urgent System Recovery |
| | Chapter 4 | - | Interfaces for Interaction with the Hardware |
| | Chapter 5 | - | Methods of Revealing Protection Mechanisms |
| | Part III - Protection against Unauthorized Copying and Data Recovery |
| | Chapter 6 | - | Anti-Copying Mechanisms |
| | Chapter 7 | - | Protection Mechanisms for Preventing Playback in PC CD-ROM |
| | Chapter 8 | - | Protection against File-by-File Disc Copying |
| | Chapter 9 | - | Protection Mechanisms Based on Binding to Storage Media |
| | Chapter 10 | - | Data Recovery from CDs |
| | List of Figures |
| | List of Tables |
| | List of Code Examples |
| | CD Content |