Hacking For Dummies

Front Cover
John Wiley & Sons, Jan 10, 2013 - Computers - 408 pages

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.

More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.

  • Guides you through the techniques and tools you need to stop hackers before they hack you
  • Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux
  • Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
  • Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place

If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.

 

What people are saying - Write a review

User Review - Flag as inappropriate

if you need a programmer or certified hacker, get at privateyedea@gmail.com

User Review - Flag as inappropriate

m

Contents

Visit www dummies comcheatsheethacking toviewthisbooks
Where to Go from Here
Introduction to Ethical Hacking
Cracking the Hacker Mindset
Developing Your Ethical HackingPlan
Hacking Methodology
Assessing Vulnerabilities
Social Engineering
Putting Up General Network Defenses
Rogue wireless devices
Mobile Devices
Windows
Linux
Systemscanning Countermeasures against system scanning
Securing the rhosts and hosts equiv Files
Hacking Applications

Physical Security Identifying Basic Physical Security Vulnerabilities
Passwords
Windows
Websites and Applications
Copyright

Other editions - View all

Common terms and phrases

About the author (2013)

Kevin Beaver is an information security consultant, expert witness, and professional speaker with more than 25 years of experience in IT. He specializes in performing independent information security assessments for Fortune 1000 corporations, nonprofits, local and state government agencies, and IT product vendors.

Bibliographic information