Image from Google Jackets

Hacking for dummies / by Kevin Beaver ; foreword by Richard Stiennon.

By: Contributor(s): Material type: TextTextSeries: --For dummiesPublisher: Hoboken, NJ : John Wiley & Sons, Inc., [2016]Copyright date: ©2016Edition: 5th editionDescription: xvi, 390 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 1119154685
  • 9781119154686
Subject(s): DDC classification:
  • 005.8 BEA 23336 23 23336
Online resources:
Contents:
pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.
Summary: Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode
Books Books RLKU Library & Information Resource Centre Computer Sciences 005.8 BEA 23336 (Browse shelf(Opens below)) Available 23336

Previous edition: 2013.

Includes and index.

pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.

Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!

There are no comments on this title.

to post a comment.
Chief Librarian: Shafqat Rafique Jagranvi
© Copyright 2023- Rashid Latif Khan University(LIRC) Lahore. All Rights Reserved,
IDEAS Technology