Tuesday, May 21, 2019

Hacking For Dummies, (5th Edition)

File Size: 4.45 Mb

Welcome to Hacking For Dummies, 5th Edition. This book outlines — in plain English — computer hacker tricks and techniques that you can use to assess the security of your information systems, find the vulnerabilities that matter, and fix the weaknesses before criminal hackers and malicious insiders take advantage of them. This hacking is the professional, aboveboard, and legal type of security testing — which I often refer to as ethical hacking throughout the book.

Computer and network security is a complex subject and an ever‐moving target. You must stay on top of it to ensure that your information is protected from the bad guys. That’s where the techniques and tools outlined in this book can help.

You can implement all the security technologies and other best practices possible, and your information systems might be secure — as far as you know. However, until you understand how malicious attackers think, apply that knowledge, and use the right tools to assess your systems from their point of view, it’s practically impossible to have a true sense of how secure your information really is.

Part I: Building the Foundation for Security Testing
Chapter 1: Introduction to Ethical Hacking
Chapter 2: Cracking the Hacker Mindset
Chapter 3: Developing Your Ethical Hacking Plan
Chapter 4: Hacking Methodology
Part II: Putting Security Testing in Motion
Chapter 5: Information Gathering
Chapter 6: Social Engineering
Chapter 7: Physical Security
Chapter 8: Passwords
Part III: Hacking Network Hosts
Chapter 9: Network Infrastructure Systems
Chapter 10: Wireless Networks
Chapter 11: Mobile Devices
Part IV: Hacking Operating Systems
Chapter 12: Windows
Chapter 13: Linux
Part V: Hacking Applications
Chapter 14: Communication and Messaging Systems
Chapter 15: Web Applications and Mobile Apps
Chapter 16: Databases and Storage Systems
Part VI: Security Testing Aftermat
Chapter 17: Reporting Your Results
Chapter 18: Plugging Security Holes
Chapter 19: Managing Security Processes
Part VII: The Part of Tens
Chapter 20: Ten Tips for Getting Security Buy-In
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test
Chapter 22: Ten Deadly Mistakes
Appendix: Tools and Resources

Author Details
"Kevin Beaver"

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment