Hacking For Dummies

Hacking For Dummies

By (author)


Free delivery worldwide

Dispatched from the UK in 1 business day

When will my order arrive?


Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices. * Guides you through the techniques and tools you need to stop hackers before they hack you * Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux * Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely * Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.

show more

Product details

  • Paperback | 408 pages
  • 186 x 234 x 22mm | 598.74g
  • John Wiley & Sons Inc
  • New York, United States
  • English
  • Revised
  • 4th Revised edition
  • ill
  • 1118380932
  • 9781118380932
  • 147,132

Other books in Computer Fraud & Hacking

Other people who viewed this bought

Other books in this series

Review quote

'If you are looking for a practical guide that can teach you real-world hacking and penetration testing skills, Hacking For Dummies is an excellent resource. (RSA Conference. January 2013)

show more

Back cover copy

Learn to: Defend against the latest Windows(R) 8 and Linux(R) hacks Develop an effective ethical hacking plan Protect web applications, databases, laptops, and smartphones Use the latest testing tools and techniques Are you a defender of systems? Then you need this book! Learn how to ward off attacks Until you can think like a bad guy and recognize the vulnerabilities in your systems, you can't build an effective plan to keep your information secure. This book helps you stay on top of the security game! Here's just what you need to know about penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking. How a hacker thinks -- explore the malicious mindset and learn what steps to take as you plan your ethical hacking program Recognize common tricks -- learn about social engineering, password-cracking techniques, and physical security issues Get rolling -- choose the right tools and set your plan in motion Demystify mobile security -- learn to protect smartphones, laptops, and tablets used in your organization Protect the network -- discover weaknesses in TCP/IP and wireless networks and learn to secure them Lock your Windows -- fortify your Windows and Linux operating systems against attack App attack -- find the vulnerabilities in business applications such as e-mail, web apps, and databases Use what you learn -- correct the flaws you find and keep looking for more Open the book and find: Fundamentals of ethical hacking The weak links in most security programs Countermeasures to network vulnerabilities Help establishing an ongoing program How to develop reports on the information you gather Tips for selling your plan to management Case studies of common hack attacks A list of ethical hacking tools and resources

show more

About Kevin Beaver

Kevin Beaver is an information security consultant, expert witness, and professional speaker with more than 25 years of experience in IT. He specializes in performing independent information security assessments for Fortune 1000 corporations, nonprofits, local and state government agencies, and IT product vendors.

show more