Hacking For Dummies

Front Cover
John Wiley & Sons, Jan 23, 2007 - Computers - 388 pages
16 Reviews
Are you worried about external hackers and rogue insiders breaking into your systems? Whether it's social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself-an ethical hacker.

"Hacking for Dummies" shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to: Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems

As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With "Hacking For Dummies, " you can strengthen your defenses and prevent attacks from every angle!


What people are saying - Write a review

User ratings

5 stars
4 stars
3 stars
2 stars
1 star

Review: Hacking For Dummies

User Review  - David Roberts - Goodreads

The book I read to research this post was Hacking For Dummies 4th edition which is a very good book which I read at http://safaribooksonline.com. This book is primarily about ethical hacking which is ... Read full review

Review: Hacking For Dummies

User Review  - Govind - Goodreads

This book will give me if knowledge about hacking. Read full review


Part I Building the Foundation for Ethical Hacking
Part II Putting Ethical Hacking in Motion
Part III Hacking the Network
Part IV Hacking Operating Systems
Part V Hacking Applications
Part VI Ethical Hacking Aftermath
Part VII The Part of Tens
Appendix Tools and Resources

Common terms and phrases

References to this book

All Book Search results »

About the author (2007)

Kevin Beaver is an independent information security consultant, speaker, and expert witness with two decades of experience in the IT industry. He specializes in performing information security assessments revolving around compliance and IT governance.

Bibliographic information