The Resource Hacking for Dummies
Hacking for Dummies
Resource Information
The item Hacking for Dummies represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Hacking for Dummies represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected
- Language
- eng
- Edition
- 6th ed.
- Extent
- 1 online resource (446 pages)
- Note
- Finding Buffer Overflow Vulnerabilities
- Contents
-
- Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset
- What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering
- Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems
- Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords
- Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions
- Isbn
- 9781119485513
- Label
- Hacking for Dummies
- Title
- Hacking for Dummies
- Language
- eng
- Summary
- Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected
- Cataloging source
- EBLCP
- http://library.link/vocab/creatorName
- Beaver, Kevin
- Dewey number
- 005.8
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- .B438 2018eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- Series statement
- --For dummies
- http://library.link/vocab/subjectName
-
- Computer networks
- Computer security
- Hackers
- Computer networks
- Computer security
- Hackers
- Label
- Hacking for Dummies
- Note
- Finding Buffer Overflow Vulnerabilities
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset
- What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering
- Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems
- Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords
- Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions
- Control code
- 1043645788
- Dimensions
- unknown
- Edition
- 6th ed.
- Extent
- 1 online resource (446 pages)
- Form of item
- online
- Isbn
- 9781119485513
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- b031f3b8-7fb1-4956-b9a0-f6b42ffbac18
- Specific material designation
- remote
- System control number
- (OCoLC)1043645788
- Label
- Hacking for Dummies
- Note
- Finding Buffer Overflow Vulnerabilities
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset
- What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering
- Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems
- Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords
- Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions
- Control code
- 1043645788
- Dimensions
- unknown
- Edition
- 6th ed.
- Extent
- 1 online resource (446 pages)
- Form of item
- online
- Isbn
- 9781119485513
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- b031f3b8-7fb1-4956-b9a0-f6b42ffbac18
- Specific material designation
- remote
- System control number
- (OCoLC)1043645788
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Hacking-for-Dummies/P17RtwhLHxw/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Hacking-for-Dummies/P17RtwhLHxw/">Hacking for Dummies</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Hacking for Dummies
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Hacking-for-Dummies/P17RtwhLHxw/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Hacking-for-Dummies/P17RtwhLHxw/">Hacking for Dummies</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>