skip to content
Hacking Preview this item
ClosePreview this item
Checking...

Hacking

Author: Kevin M Beaver
Publisher: Hoboken, NJ : John Wiley & Sons, Inc., [2018]
Series: --For dummies.
Edition/Format:   Print book : English : 6th editionView all editions and formats
Summary:
"Be a good guy by thinking like a bad guy. To outsmart a hacker, you must think like a hacker. Security expert Kevin Beaver shows you what motivates hackers and what they're looking for. He lets you in on the secrets of vulnerability and penetration testing, security best practices, and everything else you need to know to stop attackers before they cause problems for your business. Learn how to protect your servers  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Kevin M Beaver
ISBN: 9781119485476 1119485479
OCLC Number: 1043392947
Description: xiv, 392 pages : illustrations ; 24 cm.
Contents: Part I: Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology --
Part II: Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords --
Part III: Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices --
Part IV: Hacking operating systems. Windows ; Linux and macOS --
Part V: Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems --
Part VI: Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes --
Part VII: The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes --
Appendix: tools and resources.
Series Title: --For dummies.
Other Titles: Hacking for dummies
Responsibility: by Kevin Beaver.

Abstract:

"Prevent Windows 10 , Linux , and macOS attacks; use the latest tools and techniques; develop a security testing plan"--Cover.  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1043392947> # Hacking
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "1043392947" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_security> ; # Computer security
    schema:about <http://dewey.info/class/005.8/a23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/hackers> ; # Hackers
    schema:about <http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:author <http://experiment.worldcat.org/entity/work/data/948172#Person/beaver_kevin_m> ; # Kevin M. Beaver
    schema:bookEdition "6th edition." ;
    schema:bookFormat bgn:PrintBook ;
    schema:datePublished "2018" ;
    schema:description "Part I: Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- Part II: Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- Part III: Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- Part IV: Hacking operating systems. Windows ; Linux and macOS -- Part V: Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- Part VI: Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- Part VII: The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes -- Appendix: tools and resources."@en ;
    schema:description ""Be a good guy by thinking like a bad guy. To outsmart a hacker, you must think like a hacker. Security expert Kevin Beaver shows you what motivates hackers and what they're looking for. He lets you in on the secrets of vulnerability and penetration testing, security best practices, and everything else you need to know to stop attackers before they cause problems for your business. Learn how to protect your servers and desktops, web applications, mobile devices, or your entire network"--Page 4 of cover."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/948172> ; # Hacking for dummies
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/948172#Series/for_dummies> ; # --For dummies.
    schema:name "Hacking"@en ;
    schema:productID "1043392947" ;
    schema:workExample <http://worldcat.org/isbn/9781119485476> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1043392947> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/948172#Person/beaver_kevin_m> # Kevin M. Beaver
    a schema:Person ;
    schema:familyName "Beaver" ;
    schema:givenName "Kevin M." ;
    schema:name "Kevin M. Beaver" ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Series/for_dummies> # --For dummies.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1043392947> ; # Hacking
    schema:name "--For dummies." ;
    schema:name "For dummies" ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/948172#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://worldcat.org/entity/work/id/948172> # Hacking for dummies
    schema:name "Hacking for dummies" ;
    .

<http://worldcat.org/isbn/9781119485476>
    a schema:ProductModel ;
    schema:isbn "1119485479" ;
    schema:isbn "9781119485476" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.