Thank you for visiting us. We are currently updating our shopping cart and regret to advise that it will be unavailable until September 1, 2014. We apologise for any inconvenience and look forward to serving you again.

Wiley
Wiley.com
Print this page Share

Hacking For Dummies, 4th Edition

ISBN: 978-1-118-38093-2
408 pages
January 2013
Hacking For Dummies, 4th Edition (1118380932) cover image

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.

More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.

  • Guides you through the techniques and tools you need to stop hackers before they hack you
  • Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux
  • Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
  • Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place

If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.

See More
Introduction 1

Part I: Building the Foundation for Ethical Hacking 7

Chapter 1: Introduction to Ethical Hacking 9

Chapter 2: Cracking the Hacker Mindset 25

Chapter 3: Developing Your Ethical Hacking Plan 35

Chapter 4: Hacking Methodology 47

Part II: Putting Ethical Hacking in Motion 63

Chapter 5: Social Engineering 65

Chapter 6: Physical Security 81

Chapter 7: Passwords 93

Part III: Hacking Network Hosts 121

Chapter 8: Network Infrastructure 123

Chapter 9: Wireless LANs 157

Chapter 10: Mobile Devices 185

Part IV: Hacking Operating Systems 197

Chapter 11: Windows 199

Chapter 12: Linux 227

Part V: Hacking Applications 249

Chapter 13: Communication and Messaging Systems 251

Chapter 14: Websites and Applications 277

Chapter 15: Databases and Storage Systems 305

Part VI: Ethical Hacking Aftermath 317

Chapter 16: Reporting Your Results 319

Chapter 17: Plugging Security Holes 325

Chapter 18: Managing Security Processes 331

Part VII: The Part of Tens 339

Chapter 19: Ten Tips for Getting Upper Management Buy-In 341

Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test 347

Chapter 21: Ten Deadly Mistakes 351

Appendix: Tools and Resources 355

Index 373

See More

Kevin Beaver is an information security consultant, expert witness, and professional speaker with more than 25 years of experience in IT. He specializes in performing independent information security assessments for Fortune 1000 corporations, nonprofits, local and state government agencies, and IT product vendors.

See More
Download TitleSizeDownload
Updates
Please check back here for updates.

   
See More

Related Titles

Back to Top