This collection of topics give step by step instructions on how to perform common Hostile Takeover authoring operations.