Hacking For Dummies

Hacking For Dummies

3.71 (252 ratings by Goodreads)
By (author) 

List price: US$29.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.
* Guides you through the techniques and tools you need to stop hackers before they hack you * Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux * Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely * Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.
show more

Product details

  • Paperback | 408 pages
  • 186 x 234 x 22mm | 598.74g
  • New York, United States
  • English
  • Revised
  • 4th Revised edition
  • ill
  • 1118380932
  • 9781118380932
  • 312,937

Back cover copy

Learn to: Defend against the latest Windows(R) 8 and Linux(R) hacks Develop an effective ethical hacking plan Protect web applications, databases, laptops, and smartphones Use the latest testing tools and techniques Are you a defender of systems? Then you need this book! Learn how to ward off attacks Until you can think like a bad guy and recognize the vulnerabilities in your systems, you can't build an effective plan to keep your information secure. This book helps you stay on top of the security game! Here's just what you need to know about penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking. How a hacker thinks -- explore the malicious mindset and learn what steps to take as you plan your ethical hacking program Recognize common tricks -- learn about social engineering, password-cracking techniques, and physical security issues Get rolling -- choose the right tools and set your plan in motion Demystify mobile security -- learn to protect smartphones, laptops, and tablets used in your organization Protect the network -- discover weaknesses in TCP/IP and wireless networks and learn to secure them Lock your Windows -- fortify your Windows and Linux operating systems against attack App attack -- find the vulnerabilities in business applications such as e-mail, web apps, and databases Use what you learn -- correct the flaws you find and keep looking for more Open the book and find: Fundamentals of ethical hacking The weak links in most security programs Countermeasures to network vulnerabilities Help establishing an ongoing program How to develop reports on the information you gather Tips for selling your plan to management Case studies of common hack attacks A list of ethical hacking tools and resources
show more

Table of contents

Introduction 1 Part I: Building the Foundation for Ethical Hacking 7 Chapter 1: Introduction to Ethical Hacking 9 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Ethical Hacking Plan 35 Chapter 4: Hacking Methodology 47 Part II: Putting Ethical Hacking in Motion 63 Chapter 5: Social Engineering 65 Chapter 6: Physical Security 81 Chapter 7: Passwords 93 Part III: Hacking Network Hosts 121 Chapter 8: Network Infrastructure 123 Chapter 9: Wireless LANs 157 Chapter 10: Mobile Devices 185 Part IV: Hacking Operating Systems 197 Chapter 11: Windows 199 Chapter 12: Linux 227 Part V: Hacking Applications 249 Chapter 13: Communication and Messaging Systems 251 Chapter 14: Websites and Applications 277 Chapter 15: Databases and Storage Systems 305 Part VI: Ethical Hacking Aftermath 317 Chapter 16: Reporting Your Results 319 Chapter 17: Plugging Security Holes 325 Chapter 18: Managing Security Processes 331 Part VII: The Part of Tens 339 Chapter 19: Ten Tips for Getting Upper Management Buy-In 341 Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test 347 Chapter 21: Ten Deadly Mistakes 351 Appendix: Tools and Resources 355 Index 373
show more

Review Text

If you are looking for a practical guide that can teach you real-world hacking and penetration testing skills, Hacking For Dummies is an excellent resource.' (RSA Conference. January 2013)
show more

Review quote

'If you are looking for a practical guide that can teach you real-world hacking and penetration testing skills, Hacking For Dummies is an excellent resource. (RSA Conference. January 2013)
show more

About Kevin Beaver

Kevin Beaver is an information security consultant, expert witness, and professional speaker with more than 25 years of experience in IT. He specializes in performing independent information security assessments for Fortune 1000 corporations, nonprofits, local and state government agencies, and IT product vendors.
show more

Rating details

252 ratings
3.71 out of 5 stars
5 29% (74)
4 31% (79)
3 25% (63)
2 10% (26)
1 4% (10)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X