Hacking for Dummies
Hungry Minds Inc,U.S.
9780764557842 (ISBN)
- Titel erscheint in neuer Auflage
- Artikel merken
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities; shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing; helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them; and guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.
Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.
Foreword. Introduction. Part I: Building the Foundation for Ethical Hacking. Chapter 1: Introduction to Ethical Hacking. Chapter 2: Cracking the Hacker Mindset. Chapter 3: Developing Your Ethical Hacking Plan. Chapter 4: Hacking Methodology. Part II: Putting Ethical Hacking in Motion. Chapter 5: Social Engineering. Chapter 6: Physical Security. Chapter 7: Passwords. Part III: Network Hacking. Chapter 8: War Dialing. Chapter 9: Network Infrastructure. Chapter 10: Wireless LANs. Part IV: Operating System Hacking. Chapter 11: Windows. Chapter 12: Linux. Chapter 13: Novell NetWare. Part V: Application Hacking. Chapter 14: Malware. Chapter 15: Messaging Systems. Chapter 16: Web Applications. Part VI: Ethical Hacking Aftermath. Chapter 17: Reporting Your Results. Chapter 18: Plugging Security Holes. Chapter 19: Managing Security Changes. Part VII: The Part of Tens. Chapter 20: Ten Tips for Getting Upper Management Buy--In. Chapter 21: Ten Deadly Mistakes. Part VIII: Appendixes. Appendix A: Tools and Resources. Appendix B: About the Book Web Site. Index.
| Erscheint lt. Verlag | 7.5.2004 |
|---|---|
| Zusatzinfo | Illustrations |
| Verlagsort | Foster City |
| Sprache | englisch |
| Maße | 187 x 234 mm |
| Gewicht | 539 g |
| Einbandart | Paperback |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| ISBN-13 | 9780764557842 / 9780764557842 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |