Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Hacking For Dummies

 E-Book
Sofort lieferbar | Lieferzeit: Sofort lieferbar I
ISBN-13:
9781119154709
Veröffentl:
2015
Einband:
E-Book
Seiten:
408
Autor:
Kevin Beaver
eBook Typ:
PDF
eBook Format:
E-Book
Kopierschutz:
Adobe DRM [Hard-DRM]
Sprache:
Englisch
Beschreibung:

Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources. Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network. Defend your system and all of the data it holds against the latest Windows 10 and Linux hacks Develop an effective ethical hacking plan that keeps your system safe Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it and it will become your go-to reference when ethical hacking is on your to-do list.
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources.Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system--and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network.* Defend your system--and all of the data it holds--against the latest Windows 10 and Linux hacks* Develop an effective ethical hacking plan that keeps your system safe* Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies* Leverage the latest testing tools and techniques when using ethical hacking to keep your system secureHacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it--and it will become your go-to reference when ethical hacking is on your to-do list.
Foreword XVIntroduction 1Part I: Building the Foundation for Security Testing 7Chapter 1: Introduction to Ethical Hacking 9Chapter 2: Cracking the Hacker Mindset 25Chapter 3: Developing Your Ethical Hacking Plan 37Chapter 4: Hacking Methodology 49Part II: Putting Security Testing in Motion 59Chapter 5: Information Gathering 61Chapter 6: Social Engineering 67Chapter 7: Physical Security 83Chapter 8: Passwords 93Part III: Hacking Network Hosts 121Chapter 9: Network Infrastructure Systems 123Chapter 10: Wireless Networks 159Chapter 11: Mobile Devices 187Part IV: Hacking Operating Systems 201Chapter 12: Windows 203Chapter 13: Linux 231Part V: Hacking Applications 253Chapter 14: Communication and Messaging Systems 255Chapter 15: Web Applications and Mobile Apps 279Chapter 16: Databases and Storage Systems 305Part VI: Security Testing Aftermath 317Chapter 17: Reporting Your Results 319Chapter 18: Plugging Security Holes 325Chapter 19: Managing Security Processes 331Part VII: The Part of Tens 339Chapter 20: Ten Tips for Getting Security Buy-In 341Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 347Chapter 22: Ten Deadly Mistakes 351Appendix: Tools and Resources 355Index 373

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.