Southville International School and Colleges
Normal view MARC view ISBD view

Hacking for dummies /

by Beaver, Kevin [author.]; Stiennon, Richard [author of foreword.].
Type: materialTypeLabelBookSeries: --For dummies: Publisher: NJ : John Wiley & Sons, Inc., 2016Edition: 5th edition.Description: xvi, 390 pages : illustrations ; 24 cm.ISBN: 1119154685; 9781119154686.Subject(s): Computer security | Computer networks -- Security measures | HackersOnline resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.
Summary: Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!
    average rating: 0.0 (0 votes)
Item type Location Call number Status Date due Barcode
Books Books
College Library

College Library

Graduate Section
QA 76.9.A25 .B42 2016 (Browse shelf) Available C20832

Previous edition: 2013.

Includes and index.

pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.

Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!

There are no comments for this item.

Log in to your account to post a comment.
Powered by Koha