Hacking for dummies

Author(s)

Bibliographic Information

Hacking for dummies

by Kevin Beaver ; foreword by Stuart McClure

(--For dummies)

Wiley Publishing, c2004

  • : pbk.

Available at  / 1 libraries

Search this Book/Journal

Note

Includes bibliographical references and index

Description and Table of Contents

Description

"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities; shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing; helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them; and guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.

Table of Contents

Foreword. Introduction. Part I: Building the Foundation for Ethical Hacking. Chapter 1: Introduction to Ethical Hacking. Chapter 2: Cracking the Hacker Mindset. Chapter 3: Developing Your Ethical Hacking Plan. Chapter 4: Hacking Methodology. Part II: Putting Ethical Hacking in Motion. Chapter 5: Social Engineering. Chapter 6: Physical Security. Chapter 7: Passwords. Part III: Network Hacking. Chapter 8: War Dialing. Chapter 9: Network Infrastructure. Chapter 10: Wireless LANs. Part IV: Operating System Hacking. Chapter 11: Windows. Chapter 12: Linux. Chapter 13: Novell NetWare. Part V: Application Hacking. Chapter 14: Malware. Chapter 15: Messaging Systems. Chapter 16: Web Applications. Part VI: Ethical Hacking Aftermath. Chapter 17: Reporting Your Results. Chapter 18: Plugging Security Holes. Chapter 19: Managing Security Changes. Part VII: The Part of Tens. Chapter 20: Ten Tips for Getting Upper Management Buy--In. Chapter 21: Ten Deadly Mistakes. Part VIII: Appendixes. Appendix A: Tools and Resources. Appendix B: About the Book Web Site. Index.

by "Nielsen BookData"

Related Books: 1-1 of 1

Details

Page Top