Hacking For Dummies
34%
off

Hacking For Dummies

3.73 (243 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 3 business days
When will my order arrive?

Not expected to be delivered to the United States by Christmas Not expected to be delivered to the United States by Christmas

Description

Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources. Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network. Defend your system and all of the data it holds against the latest Windows 10 and Linux hacksDevelop an effective ethical hacking plan that keeps your system safeProtect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategiesLeverage the latest testing tools and techniques when using ethical hacking to keep your system secure Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it and it will become your go-to reference when ethical hacking is on your to-do list.show more

Product details

  • Paperback | 408 pages
  • 187 x 234 x 20mm | 548g
  • John Wiley & Sons Inc
  • New York, United States
  • English
  • 5th Edition
  • 1119154685
  • 9781119154686
  • 107,807

About Kevin Beaver

Kevin Beaver is an independent information security consultant, expert witness, professional speaker, and writer with Atlanta, GA-based Principle Logic, LLC. You can connect with Kevin through his website www.principlelogic.com and on Twitter at @kevinbeaver.show more

Review quote

"For those looking for a high-level theoretical approach to network defense, look elsewhere. This is an in the trenches guide you can use to ensure that your organization's systems and network are secure." (Ben Rothke, April 2016)show more

Back cover copy

Learn to: Defend against the latest Windows (R) 10 and Linux(R) hacks Develop an effective security testing plan Protect web applications, databases, laptops, servers, and smartphones Use the latest testing tools and techniques Protect your network against malicious attacks Is hacking something left to the bad guys? Certainly not! If security assessments are on your to-do list, this book helps you identify vulnerabilities in your system and stay on top of the security game. Here's just what you need to defend your network environment--and all of the data it holds--against hacks, including the latest Windows 10 and Linux hacks. Know your enemy -- get in the malicious mindset and discover how to plan your security testing efforts throughout the security assessment process Put your plan into motion -- get familiar with several well-known and widely used hack attacks, like information gathering, social engineering, and cracking passwords Improve communications -- find out how networks are compromised by using specific methods of flawed network communications Find your flaws -- exploit well-known vulnerabilities in Windows, Mac OS X(R), and Linux operating systems, take over operating systems remotely, and implement countermeasures to make your operating systems more secure App attack -- find the latest on hacking messaging systems, web applications, mobile apps, and databases Open the book and find: The fundamentals of vulnerability assessments and penetration testing Common weak links in most security programs How smartphones, tablets, and the Internet of Things can be exploited Tips and tricks to perform common security tests against your business systems How to develop reports on the information you gather to get management interested Guidance on correcting the flaws you find--and how to keep looking for moreshow more

Table of contents

Foreword XV Introduction 1 Part I: Building the Foundation for Security Testing 7 Chapter 1: Introduction to Ethical Hacking 9 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Ethical Hacking Plan 37 Chapter 4: Hacking Methodology 49 Part II: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 67 Chapter 7: Physical Security 83 Chapter 8: Passwords 93 Part III: Hacking Network Hosts 121 Chapter 9: Network Infrastructure Systems 123 Chapter 10: Wireless Networks 159 Chapter 11: Mobile Devices 187 Part IV: Hacking Operating Systems 201 Chapter 12: Windows 203 Chapter 13: Linux 231 Part V: Hacking Applications 253 Chapter 14: Communication and Messaging Systems 255 Chapter 15: Web Applications and Mobile Apps 279 Chapter 16: Databases and Storage Systems 305 Part VI: Security Testing Aftermath 317 Chapter 17: Reporting Your Results 319 Chapter 18: Plugging Security Holes 325 Chapter 19: Managing Security Processes 331 Part VII: The Part of Tens 339 Chapter 20: Ten Tips for Getting Security Buy-In 341 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 347 Chapter 22: Ten Deadly Mistakes 351 Appendix: Tools and Resources 355 Index 373show more

Review Text

"For those looking for a high-level theoretical approach to network defense, look elsewhere. This is an in the trenches guide you can use to ensure that your organization's systems and network are secure." (Ben Rothke, April 2016)show more

Rating details

243 ratings
3.73 out of 5 stars
5 29% (71)
4 32% (78)
3 25% (61)
2 10% (24)
1 4% (9)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X