Hacking For Dummies, 4th Edition Front Cover

Hacking For Dummies, 4th Edition

  • Length: 408 pages
  • Edition: 4
  • Publisher:
  • Publication Date: 2013-01-29
  • ISBN-10: 1118380932
  • ISBN-13: 9781118380932
  • Sales Rank: #831047 (See Top 100 Books)
Description

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack – first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker’s mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.

More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.

  • Guides you through the techniques and tools you need to stop hackers before they hack you
  • Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux
  • Explores the malicious hackers’s mindset so that you can counteract or avoid attacks completely
  • Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place

If you’re responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.

Table of Contents

Part I: Building the Foundation for Ethical Hacking
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Cracking the Hacker Mindset
Chapter 3: Developing Your Ethical Hacking Plan
Chapter 4: Hacking Methodology

Part II: Putting Ethical Hacking in Motion
Chapter 5: Social Engineering
Chapter 6: Physical Security
Chapter 7: Passwords

Part III: Hacking Network Hosts
Chapter 8: Network Infrastructure
Chapter 9: Wireless LANs
Chapter 10: Mobile Devices

Part IV: Hacking Operating Systems
Chapter 11: Windows
Chapter 12: Linux

Part V: Hacking Applications
Chapter 13: Communication and Messaging Systems
Chapter 14: Websites and Applications
Chapter 15: Databases and Storage Systems

Part VI: Ethical Hacking Aftermath
Chapter 16: Reporting Your Results
Chapter 17: Plugging Security Holes
Chapter 18: Managing Security Processes

Part VII: The Part of Tens
Chapter 19: Ten Tips for Getting Upper Management Buy-In
Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test
Chapter 21: Ten Deadly Mistakes
Chapter 22: Tools and Resources

To access the link, solve the captcha.