Hacking For Dummies

Hacking For Dummies

Paperback For Dummies

By (author) Kevin Beaver

$19.99
List price $34.35
You save $14.36 41% off

Free delivery worldwide
Available
Dispatched in 3 business days
When will my order arrive?

  • Publisher: John Wiley & Sons Inc
  • Format: Paperback | 408 pages
  • Dimensions: 186mm x 234mm x 22mm | 599g
  • Publication date: 29 January 2013
  • Publication City/Country: New York
  • ISBN 10: 1118380932
  • ISBN 13: 9781118380932
  • Edition: 4, Revised
  • Edition statement: 4th Revised edition
  • Illustrations note: ill
  • Sales rank: 189,941

Product description

Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices. Guides you through the techniques and tools you need to stop hackers before they hack you Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition .

Other books in this category

Showing items 1 to 11 of 11
Categories:

Author information

Kevin Beaver is an information security consultant, expert witness, and professional speaker with more than 25 years of experience in IT. He specializes in performing independent information security assessments for Fortune 1000 corporations, nonprofits, local and state government agencies, and IT product vendors.

Review quote

'If you are looking for a practical guide that can teach you real-world hacking and penetration testing skills, Hacking For Dummies is an excellent resource.' (RSA Conference. January 2013)

Back cover copy

Learn to: Defend against the latest Windows(R) 8 and Linux(R) hacksDevelop an effective ethical hacking planProtect web applications, databases, laptops, and smartphonesUse the latest testing tools and techniquesAre you a defender of systems?Then you need this book!Learn how to ward off attacksUntil you can think like a bad guy and recognize the vulnerabilities in your systems, you can't build an effective plan to keep your information secure. This book helps you stay on top of the security game! Here's just what you need to know about penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking.How a hacker thinks -- explore the malicious mindset and learn what steps to take as you plan your ethical hacking programRecognize common tricks -- learn about social engineering, password-cracking techniques, and physical security issuesGet rolling -- choose the right tools and set your plan in motionDemystify mobile security -- learn to protect smartphones, laptops, and tablets used in your organizationProtect the network -- discover weaknesses in TCP/IP and wireless networks and learn to secure themLock your Windows -- fortify your Windows and Linux operating systems against attackApp attack -- find the vulnerabilities in business applications such as e-mail, web apps, and databasesUse what you learn -- correct the flaws you find and keep looking for more"Open the book and find: Fundamentals of ethical hackingThe weak links in most security programsCountermeasures to network vulnerabilitiesHelp establishing an ongoing programHow to develop reports on the information you gatherTips for selling your plan to managementCase studies of common hack attacksA list of ethical hacking tools and resources

Table of contents

Introduction 1 Part I: Building the Foundation for Ethical Hacking 7 Chapter 1: Introduction to Ethical Hacking 9 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Ethical Hacking Plan 35 Chapter 4: Hacking Methodology 47 Part II: Putting Ethical Hacking in Motion 63 Chapter 5: Social Engineering 65 Chapter 6: Physical Security 81 Chapter 7: Passwords 93 Part III: Hacking Network Hosts 121 Chapter 8: Network Infrastructure 123 Chapter 9: Wireless LANs 157 Chapter 10: Mobile Devices 185 Part IV: Hacking Operating Systems 197 Chapter 11: Windows 199 Chapter 12: Linux 227 Part V: Hacking Applications 249 Chapter 13: Communication and Messaging Systems 251 Chapter 14: Websites and Applications 277 Chapter 15: Databases and Storage Systems 305 Part VI: Ethical Hacking Aftermath 317 Chapter 16: Reporting Your Results 319 Chapter 17: Plugging Security Holes 325 Chapter 18: Managing Security Processes 331 Part VII: The Part of Tens 339 Chapter 19: Ten Tips for Getting Upper Management Buy-In 341 Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test 347 Chapter 21: Ten Deadly Mistakes 351 Appendix: Tools and Resources 355 Index 373