skip to content
Hacking for Dummies. Preview this item
ClosePreview this item
Checking...

Hacking for Dummies.

Author: Kevin Beaver
Publisher: Newark : John Wiley & Sons, Incorporated, 2018.
Series: --For dummies.
Edition/Format:   eBook : Document : English : 6th edView all editions and formats
Summary:
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Beaver, Kevin.
Hacking for Dummies.
Newark : John Wiley & Sons, Incorporated, ©2018
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Kevin Beaver
ISBN: 9781119485513 1119485517 9781119485544 1119485541
OCLC Number: 1043645788
Notes: Finding Buffer Overflow Vulnerabilities.
Description: 1 online resource (446 pages)
Contents: Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset. What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering. Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems. Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords. Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions.
Series Title: --For dummies.

Abstract:

"Prevent Windows 10, Linux, and macOS attacks; use the latest tools and techniques; develop a security testing plan"--Cover.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1043645788> # Hacking for Dummies.
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "1043645788" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/948172#Place/newark> ; # Newark
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'https://img1.od-cdn.com/ImageType-100/0128-1/{B031F3B8-7FB1-4956-B9A0-F6B42FFBAC18}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/hackers> ; # Hackers
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/> ;
    schema:bookEdition "6th ed." ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/948172#Person/beaver_kevin> ; # Kevin Beaver
    schema:datePublished "2018" ;
    schema:description "Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected."@en ;
    schema:description "Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/948172> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/948172#Series/for_dummies> ; # --For dummies.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/948172#CreativeWork/hacking_for_dummies> ;
    schema:name "Hacking for Dummies."@en ;
    schema:productID "1043645788" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1043645788#PublicationEvent/newark_john_wiley_&_sons_incorporated_2018> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/948172#Agent/john_wiley_&_sons_incorporated> ; # John Wiley & Sons, Incorporated
    schema:url <https://www.overdrive.com/search?q=B031F3B8-7FB1-4956-B9A0-F6B42FFBAC18> ;
    schema:url <https://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5438874> ;
    schema:url "https://img1.od-cdn.com/ImageType-100/0128-1/{B031F3B8-7FB1-4956-B9A0-F6B42FFBAC18}Img100.jpg" ;
    schema:url <https://samples.overdrive.com/?crid=b031f3b8-7fb1-4956-b9a0-f6b42ffbac18&.epub-sample.overdrive.com> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9781119485476> ;
    schema:workExample <http://worldcat.org/isbn/9781119485544> ;
    schema:workExample <http://worldcat.org/isbn/9781119485513> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1043645788> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/948172#Agent/john_wiley_&_sons_incorporated> # John Wiley & Sons, Incorporated
    a bgn:Agent ;
    schema:name "John Wiley & Sons, Incorporated" ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Person/beaver_kevin> # Kevin Beaver
    a schema:Person ;
    schema:familyName "Beaver" ;
    schema:givenName "Kevin" ;
    schema:name "Kevin Beaver" ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Series/for_dummies> # --For dummies.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1043645788> ; # Hacking for Dummies.
    schema:name "--For dummies." ;
    schema:name "--For dummies" ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://worldcat.org/isbn/9781119485513>
    a schema:ProductModel ;
    schema:isbn "1119485517" ;
    schema:isbn "9781119485513" ;
    .

<http://worldcat.org/isbn/9781119485544>
    a schema:ProductModel ;
    schema:isbn "1119485541" ;
    schema:isbn "9781119485544" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.