Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Hacking for Dummies - K Beaver

Hacking for Dummies

K Beaver (Autor)

Media-Kombination
378 Seiten
2004
Hungry Minds Inc,U.S.
9780764557842 (ISBN)
CHF 34,35 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Not intended for malicious hackers, this book discusses hacking methods and penetration testing techniques that are non-destructive in nature and explores the malicious hacker's mindset. It helps the reader develop an ethical hacking plan, and covers eleven typical hack attacks and how to counteract them.
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities; shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing; helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them; and guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized.

Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.

Foreword. Introduction. Part I: Building the Foundation for Ethical Hacking. Chapter 1: Introduction to Ethical Hacking. Chapter 2: Cracking the Hacker Mindset. Chapter 3: Developing Your Ethical Hacking Plan. Chapter 4: Hacking Methodology. Part II: Putting Ethical Hacking in Motion. Chapter 5: Social Engineering. Chapter 6: Physical Security. Chapter 7: Passwords. Part III: Network Hacking. Chapter 8: War Dialing. Chapter 9: Network Infrastructure. Chapter 10: Wireless LANs. Part IV: Operating System Hacking. Chapter 11: Windows. Chapter 12: Linux. Chapter 13: Novell NetWare. Part V: Application Hacking. Chapter 14: Malware. Chapter 15: Messaging Systems. Chapter 16: Web Applications. Part VI: Ethical Hacking Aftermath. Chapter 17: Reporting Your Results. Chapter 18: Plugging Security Holes. Chapter 19: Managing Security Changes. Part VII: The Part of Tens. Chapter 20: Ten Tips for Getting Upper Management Buy--In. Chapter 21: Ten Deadly Mistakes. Part VIII: Appendixes. Appendix A: Tools and Resources. Appendix B: About the Book Web Site. Index.

Erscheint lt. Verlag 7.5.2004
Zusatzinfo Illustrations
Verlagsort Foster City
Sprache englisch
Maße 187 x 234 mm
Gewicht 539 g
Einbandart Paperback
Themenwelt Informatik Theorie / Studium Kryptologie
ISBN-13 9780764557842 / 9780764557842
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?