Hacking for Dummies

Hacking for Dummies

3.71 (252 ratings by Goodreads)
  • Mixed media product
By (author) 

List price: US$24.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks


"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities; shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing; helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them; and guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.
show more

Product details

  • Mixed media product | 378 pages
  • 189 x 236.2 x 23.6mm | 544.32g
  • John Wiley & Sons Inc
  • Hungry Minds Inc,U.S.
  • Foster City, United States
  • 076455784X
  • 9780764557842

Review quote

"...a good read...a price well--worth paying, because such works are invaluable..." (InfoSecurity News Magazine, August 2004) "...an excellent aide..." (PC Home, August 2004) "...should be of interest to both ethical and malicious hackers..." (Publishing News, 22 nd March 2004)
show more

About K Beaver

Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.
show more

Table of contents

Foreword. Introduction. Part I: Building the Foundation for Ethical Hacking. Chapter 1: Introduction to Ethical Hacking. Chapter 2: Cracking the Hacker Mindset. Chapter 3: Developing Your Ethical Hacking Plan. Chapter 4: Hacking Methodology. Part II: Putting Ethical Hacking in Motion. Chapter 5: Social Engineering. Chapter 6: Physical Security. Chapter 7: Passwords. Part III: Network Hacking. Chapter 8: War Dialing. Chapter 9: Network Infrastructure. Chapter 10: Wireless LANs. Part IV: Operating System Hacking. Chapter 11: Windows. Chapter 12: Linux. Chapter 13: Novell NetWare. Part V: Application Hacking. Chapter 14: Malware. Chapter 15: Messaging Systems. Chapter 16: Web Applications. Part VI: Ethical Hacking Aftermath. Chapter 17: Reporting Your Results. Chapter 18: Plugging Security Holes. Chapter 19: Managing Security Changes. Part VII: The Part of Tens. Chapter 20: Ten Tips for Getting Upper Management Buy--In. Chapter 21: Ten Deadly Mistakes. Part VIII: Appendixes. Appendix A: Tools and Resources. Appendix B: About the Book Web Site. Index.
show more

Rating details

252 ratings
3.71 out of 5 stars
5 29% (74)
4 31% (79)
3 25% (63)
2 10% (26)
1 4% (10)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X