Hacking For Dummies (Google eBook)

Front Cover
John Wiley & Sons, Jan 12, 2010 - Computers - 408 pages
16 Reviews

A new edition of the bestselling guide-now updated to cover the latest hacks and how to prevent them!

It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.

Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks.

  • Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
  • Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place
  • Completely updated to examine the latest hacks to Windows 7 and the newest version of Linux
  • Explains ethical hacking and why it is essential

Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking.

  

What people are saying - Write a review

User ratings

5 stars
6
4 stars
3
3 stars
3
2 stars
1
1 star
3

Review: Hacking For Dummies

User Review  - David Roberts - Goodreads

The book I read to research this post was Hacking For Dummies 4th edition which is a very good book which I read at http://safaribooksonline.com. This book is primarily about ethical hacking which is ... Read full review

Review: Hacking For Dummies

User Review  - ARahman Rashed - Goodreads

I knew it would be a time waste. Read full review

Contents

The Part of Tens 335
5
Building the Foundation for Ethical Hacking
7
Cracking the Hacker Mindset
25
Developing Your Ethical Hacking Plan
35
Hacking Methodology
45
Putting Ethical Hacking in Motion
59
Physical Security
75
Passwords
85
Novell NetWare
229
Hacking Applications
247
Web Sites and Applications
277
Databases and Storage Systems
303
Ethical Hacking Aftermath
315
Plugging Security Holes
323
Managing Security Changes
329
Ten Tips for Getting Upper Management BuyIn
337

Hacking the Network
115
Wireless LANs
151
Hacking Operating Systems
179
Linux
207
Ten Reasons Hacking Is the Only
343
Tools and Resources
351
Index
367
Copyright

Common terms and phrases

About the author (2010)

Kevin Beaver is an independent information security consultant, expert witness, and speaker with more than 20 years of security experience. He specializes in performing information security assessments that support compliance and risk management. He is also coauthor of Hacking Wireless Networks For Dummies.

Bibliographic information