Tuesday, 3 September 2013

Book Description
                    The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Editionexplores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.
More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.
  • Guides you through the techniques and tools you need to stop hackers before they hack you
  • Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux
  • Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
  • Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place
If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 




Table of Contents

Introduction.
Part I: Building the Foundation for Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Cracking the Hacker Mindset.
Chapter 3: Developing Your Ethical Hacking Plan.
Chapter 4: Hacking Methodology.
Part II: Putting Ethical Hacking in Motion.
Chapter 5: Social Engineering..
Chapter 6: Physical Security.
Chapter 7: Passwords.
Part III: Hacking the Network.
Chapter 8: War Dialing.
Chapter 9: Network Infrastructure.
Chapter 10: Wireless LANs.
Part IV: Hacking Operating Systems.
Chapter 11: Windows.
Chapter 12: Linux.
Chapter 13: Novell NetWare.
Part V: Hacking Applications.
Chapter 14: Messaging Systems.
Chapter 15: Web Applications.
Part VI: Ethical Hacking Aftermath.
Chapter 16: Reporting Your Results.
Chapter 17: Plugging Security Holes.
Chapter 18: Managing Security Changes.
Part VII: The Part of Tens.
Chapter 19: Ten Tips for Getting Upper Management Buy-In.
Chapter 20: Ten Deadly Mistakes.
Appendix: Tools and Resources.
Index.
Downlaod : Hacking for Dummies

0 comments :

Post a Comment