Hacking For Dummies, 6th Edition
- Length: 416 pages
- Edition: 6
- Language: English
- Publisher: For Dummies
- Publication Date: 2018-07-11
- ISBN-10: 1119485479
- ISBN-13: 9781119485476
- Sales Rank: #100369 (See Top 100 Books)
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker’s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks.
Whether you’re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently—with confidence and ease.
- Get up to speed on Windows 10 hacks
- Learn about the latest mobile computing hacks
- Get free testing tools
- Find out about new system updates and improvements
There’s no such thing as being too safe—and this resourceful guide helps ensure you’re protected.
Table of Contents
Part 1: Building the Foundation for Security Testing
Chapter 1: Introduction to Vulnerability and Penetration Testing
Chapter 2: Cracking the Hacker Mindset
Chapter 3: Developing Your Security Testing Plan
Chapter 4: Hacking Methodology
Part 2: Putting Security Testing in Motion
Chapter 5: Information Gathering
Chapter 6: Social Engineering
Chapter 7: Physical Security
Chapter 8: Passwords
Part 3: Hacking Network Hosts
Chapter 9: Network Infrastructure Systems
Chapter 10: Wireless Networks
Chapter 11: Mobile Devices
Part 4: Hacking Operating Systems
Chapter 12: Windows
Chapter 13: Linux and macOS
Part 5: Hacking Applications
Chapter 14: Communication and Messaging Systems
Chapter 15: Web Applications and Mobile Apps
Chapter 16: Databases and Storage Systems
Part 6: Security Testing Aftermath
Chapter 17: Reporting Your Results
Chapter 18: Plugging Your Security Holes
Chapter 19: Managing Security Processes
Part 7: The Part of Tens
Chapter 20: Ten Tips for Getting Security Buy-In
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test
Chapter 22: Ten Deadly Mistakes