Coverart for item
The Resource Hacking for Dummies

Hacking for Dummies

Label
Hacking for Dummies
Title
Hacking for Dummies
Creator
Subject
Genre
Language
eng
Summary
Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected
Member of
Cataloging source
EBLCP
http://library.link/vocab/creatorName
Beaver, Kevin
Dewey number
005.8
Index
index present
LC call number
QA76.9.A25
LC item number
.B438 2018eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
--For dummies
http://library.link/vocab/subjectName
  • Computer networks
  • Computer security
  • Hackers
  • Computer networks
  • Computer security
  • Hackers
Label
Hacking for Dummies
Instantiates
Publication
Note
Finding Buffer Overflow Vulnerabilities
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset
  • What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering
  • Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems
  • Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords
  • Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions
Control code
1043645788
Dimensions
unknown
Edition
6th ed.
Extent
1 online resource (446 pages)
Form of item
online
Isbn
9781119485513
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
b031f3b8-7fb1-4956-b9a0-f6b42ffbac18
Specific material designation
remote
System control number
(OCoLC)1043645788
Label
Hacking for Dummies
Publication
Note
Finding Buffer Overflow Vulnerabilities
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset
  • What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering
  • Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems
  • Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords
  • Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions
Control code
1043645788
Dimensions
unknown
Edition
6th ed.
Extent
1 online resource (446 pages)
Form of item
online
Isbn
9781119485513
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
http://library.link/vocab/ext/overdrive/overdriveId
b031f3b8-7fb1-4956-b9a0-f6b42ffbac18
Specific material designation
remote
System control number
(OCoLC)1043645788

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...