An edition of Hacking For Dummies (2004)

Hacking

6th edition.
  • 5.00 ·
  • 3 Ratings
  • 177 Want to read
  • 10 Currently reading
  • 2 Have read
Hacking
Kevin M. Beaver
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 5.00 ·
  • 3 Ratings
  • 177 Want to read
  • 10 Currently reading
  • 2 Have read

Buy this book

Last edited by Drini
February 20, 2024 | History
An edition of Hacking For Dummies (2004)

Hacking

6th edition.
  • 5.00 ·
  • 3 Ratings
  • 177 Want to read
  • 10 Currently reading
  • 2 Have read

"Be a good guy by thinking like a bad guy. To outsmart a hacker, you must think like a hacker. Security expert Kevin Beaver shows you what motivates hackers and what they're looking for. He lets you in on the secrets of vulnerability and penetration testing, security best practices, and everything else you need to know to stop attackers before they cause problems for your business. Learn how to protect your servers and desktops, web applications, mobile devices, or your entire network"--Page 4 of cover.

Publish Date
Language
English
Pages
392

Buy this book

Previews available in: English

Edition Availability
Cover of: Hacking
Hacking
2018
in English - 6th edition.
Cover of: Hacking for dummies
Hacking for dummies
2016, John Wiley & Son inc. , John Wiley & Sons, Inc.
Cover of: Hacking For Dummies
Hacking For Dummies
Jan 29, 2013, For Dummies
Cover of: Hacking for dummies
Hacking for dummies
2010, Wiley Pub.
in English - 3rd ed.
Cover of: Hacking for dummies
Hacking for dummies
2007, Wiley
in English - 2nd ed.
Cover of: Hacking For Dummies
Hacking For Dummies
October 30, 2006, For Dummies
in English
Cover of: Hacking for Dummies
Hacking for Dummies
April 30, 2004, For Dummies
Paperback in English
Cover of: Hacking For Dummies
Hacking For Dummies
2004, John Wiley & Sons, Ltd.
Electronic resource in English
Cover of: Hacking for dummies
Hacking for dummies
2004, Wiley Pub.
in English

Add another edition?

Book Details


Table of Contents

Part I: Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology
Part II: Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords
Part III: Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices
Part IV: Hacking operating systems. Windows ; Linux and macOS
Part V: Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems
Part VI: Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes
Part VII: The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes
Appendix: tools and resources.

Edition Notes

Includes bibliographical references and index.

Series
For dummies, --For dummies

Classifications

Dewey Decimal Class
005.8
Library of Congress
QA76.9.A25 B42 2018, QA76.9.A25B42 2018

The Physical Object

Pagination
xiv, 392 pages
Number of pages
392

ID Numbers

Open Library
OL26961199M
ISBN 10
1119485479
ISBN 13
9781119485476
LCCN
2018944084
OCLC/WorldCat
1043392947

Work Description

While you're reading this, a hacker could be prying and spying his way into your company's IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker's mindset and take security precautions to help you avoid a hack attack. It outlines computer hacker tricks and techniques you can use to assess the security of your own information systems, find security vulnerabilities, and fix them before malicious and criminal hackers can exploit them. It covers: Hacking methodology and researching public information to see what a hacker can quickly learn about your operations Social engineering (how hackers manipulate employees to gain information and access), physical security, and password vulnerabilities Network infrastructure, including port scanners, SNMP scanning, banner grabbing, scanning, and wireless LAN vulnerabilities Operating systems, including Windows, Linux, and Novell NetWare Application hacking, including malware (Trojan horses, viruses, worms, rootkits, logic bombs, and more), e-mail and instant messaging, and Web applications Tests, tools (commercial, shareware, and freeware), and techniques that offer the most bang for your ethical hacking buck With this guide you can develop and implement a comprehensive security assessment plan, get essential support from management, test your system for vulnerabilities, take countermeasures, and protect your network infrastructure. You discover how to beat hackers at their own game, with: A hacking toolkit, including War dialing software, password cracking software, network scanning software, network vulnerability assessment software, a network analyzer, a Web application assessment tool, and more All kinds of countermeasures and ways to plug security holes A list of more than 100 security sites, tools, and resources Ethical hacking helps you fight hacking with hacking, pinpoint security flaws within your systems, and implement countermeasures. Complete with tons of screen shots, step-by-step instructions for some countermeasures, and actual case studies from IT security professionals, this is an invaluable guide, whether you're an Internet security professional, part of a penetration-testing team, or in charge of IT security for a large or small business.

Links outside Open Library

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON / OPDS | Wikipedia citation
February 20, 2024 Edited by Drini Merge works
October 5, 2021 Edited by ImportBot import existing book
May 24, 2019 Created by MARC Bot Imported from marc_openlibraries_sanfranciscopubliclibrary MARC record