skip to content
Hacking for dummies Preview this item
ClosePreview this item
Checking...

Hacking for dummies

Author: Kevin Beaver
Publisher: Hoboken, NJ : For Dummies, [2016] ©2016
Edition/Format:   eBook : Document : English : 5th editionView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Kevin Beaver
ISBN: 9781119154686 1119154685 9781119154693 1119154693 9781119154709 1119154707
OCLC Number: 1016600792
Notes: Previous edition: 2013.
Description: 1 ressource en ligne (xvi, 390 pages) : illustrations (black andwhite)
Contents: Foreword XV Introduction 1 Part I: Building the Foundation for Security Testing 7 Chapter 1: Introduction to Ethical Hacking 9 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Ethical Hacking Plan 37 Chapter 4: Hacking Methodology 49 Part II: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 67 Chapter 7: Physical Security 83 Chapter 8: Passwords 93 Part III: Hacking Network Hosts 121 Chapter 9: Network Infrastructure Systems 123 Chapter 10: Wireless Networks 159 Chapter 11: Mobile Devices 187 Part IV: Hacking Operating Systems 201 Chapter 12: Windows 203 Chapter 13: Linux 231 Part V: Hacking Applications 253 Chapter 14: Communication and Messaging Systems 255 Chapter 15: Web Applications and Mobile Apps 279 Chapter 16: Databases and Storage Systems 305 Part VI: Security Testing Aftermath 317 Chapter 17: Reporting Your Results 319 Chapter 18: Plugging Security Holes 325 Chapter 19: Managing Security Processes 331 Part VII: The Part of Tens 339 Chapter 20: Ten Tips for Getting Security Buy-In 341 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 347 Chapter 22: Ten Deadly Mistakes 351 Appendix: Tools and Resources 355 Index 373
Responsibility: by Kevin Beaver, CISSP ; foreword by RichardStiennon.

Reviews

Editorial reviews

Publisher Synopsis

"For those looking for a high-level theoretical approach to network defense, look elsewhere. This is an in the trenches guide you can use to ensure that your organization's systems and network are Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1016600792> # Hacking for dummies
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "1016600792" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/hackers> ; # Hackers
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/pirates_informatiques> ; # Pirates informatiques
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_security> ; # Computer security
    schema:bookEdition "5th edition." ;
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2016" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/948172#Person/beaver_kevin> ; # Kevin Beaver
    schema:datePublished "2016" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/948172> ;
    schema:inLanguage "en" ;
    schema:name "Hacking for dummies" ;
    schema:productID "1016600792" ;
    schema:url <http://proxy.cm.umoncton.ca/login?url=http://lib.myilibrary.com?id=881824> ;
    schema:workExample <http://worldcat.org/isbn/9781119154686> ;
    schema:workExample <http://worldcat.org/isbn/9781119154693> ;
    schema:workExample <http://worldcat.org/isbn/9781119154709> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1016600792> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/948172#Person/beaver_kevin> # Kevin Beaver
    a schema:Person ;
    schema:familyName "Beaver" ;
    schema:givenName "Kevin" ;
    schema:name "Kevin Beaver" ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security" ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Topic/pirates_informatiques> # Pirates informatiques
    a schema:Intangible ;
    schema:name "Pirates informatiques"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://proxy.cm.umoncton.ca/login?url=http://lib.myilibrary.com?id=881824>
    rdfs:comment "Disponible via MyiLibrary (réservé aux membres de l'UdeM)" ;
    .

<http://worldcat.org/isbn/9781119154686>
    a schema:ProductModel ;
    schema:isbn "1119154685" ;
    schema:isbn "9781119154686" ;
    .

<http://worldcat.org/isbn/9781119154693>
    a schema:ProductModel ;
    schema:isbn "1119154693" ;
    schema:isbn "9781119154693" ;
    .

<http://worldcat.org/isbn/9781119154709>
    a schema:ProductModel ;
    schema:isbn "1119154707" ;
    schema:isbn "9781119154709" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.