The Resource Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure
Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure
Resource Information
The item Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.This item is available to borrow from 1 library branch.
Resource Information
The item Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library.
This item is available to borrow from 1 library branch.
- Summary
- Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili
- Language
- eng
- Edition
- 2nd ed.
- Extent
- 1 online resource (1 volume).
- Contents
-
- Ch. 1. Introduction to ethical hacking
- Ch. 2. Cracking the hacker mindset
- Ch. 3. Developing your ethical hacking plan
- Ch. 4. Hacking methodology
- Ch. 5. Social engineering
- Ch. 6. Physical security
- Ch. 7. Passwords
- Ch. 8. War dialing
- Ch. 9. Network infrastructure
- Ch. 10. Wireless LANs
- Ch. 11. Windows
- Ch. 12. Linux
- Ch. 13. Novell NetWare
- Ch. 14. Messaging systems
- Ch. 15. Web applications and databases
- Ch. 16. Reporting your results
- Ch. 17. Plugging security holes
- Ch. 18. Managing security changes
- Ch. 19. Ten tips for getting upper management buy-in
- Ch. 20. Ten deadly mistakes
- Isbn
- 9780470113073
- Label
- Hacking for dummies
- Title
- Hacking for dummies
- Statement of responsibility
- by Kevin Beaver ; foreword by Stuart McClure
- Subject
-
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer Science
- Computer hackers
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computer security
- Engineering & Applied Sciences
- Hackers
- Hackers
- Language
- eng
- Summary
- Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili
- Cataloging source
- N$T
- http://library.link/vocab/creatorName
- Beaver, Kevin
- Dewey number
- 005.8
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- B42 2007eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- Series statement
- --For dummies
- http://library.link/vocab/subjectName
-
- Computer security
- Computer networks
- Hackers
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Computer security
- Computer networks
- Computer hackers
- Hackers
- Computer networks
- Computer security
- Engineering & Applied Sciences
- Computer Science
- Label
- Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Ch. 1. Introduction to ethical hacking -- Ch. 2. Cracking the hacker mindset -- Ch. 3. Developing your ethical hacking plan -- Ch. 4. Hacking methodology -- Ch. 5. Social engineering -- Ch. 6. Physical security -- Ch. 7. Passwords -- Ch. 8. War dialing -- Ch. 9. Network infrastructure -- Ch. 10. Wireless LANs -- Ch. 11. Windows -- Ch. 12. Linux -- Ch. 13. Novell NetWare -- Ch. 14. Messaging systems -- Ch. 15. Web applications and databases -- Ch. 16. Reporting your results -- Ch. 17. Plugging security holes -- Ch. 18. Managing security changes -- Ch. 19. Ten tips for getting upper management buy-in -- Ch. 20. Ten deadly mistakes
- Control code
- 75958853
- Dimensions
- unknown
- Edition
- 2nd ed.
- Extent
- 1 online resource (1 volume).
- File format
- unknown
- Form of item
- online
- Isbn
- 9780470113073
- Lccn
- 2006932690
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- 2afbba2f-abab-4861-b532-689c58041c76
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)75958853
- Label
- Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Ch. 1. Introduction to ethical hacking -- Ch. 2. Cracking the hacker mindset -- Ch. 3. Developing your ethical hacking plan -- Ch. 4. Hacking methodology -- Ch. 5. Social engineering -- Ch. 6. Physical security -- Ch. 7. Passwords -- Ch. 8. War dialing -- Ch. 9. Network infrastructure -- Ch. 10. Wireless LANs -- Ch. 11. Windows -- Ch. 12. Linux -- Ch. 13. Novell NetWare -- Ch. 14. Messaging systems -- Ch. 15. Web applications and databases -- Ch. 16. Reporting your results -- Ch. 17. Plugging security holes -- Ch. 18. Managing security changes -- Ch. 19. Ten tips for getting upper management buy-in -- Ch. 20. Ten deadly mistakes
- Control code
- 75958853
- Dimensions
- unknown
- Edition
- 2nd ed.
- Extent
- 1 online resource (1 volume).
- File format
- unknown
- Form of item
- online
- Isbn
- 9780470113073
- Lccn
- 2006932690
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- 2afbba2f-abab-4861-b532-689c58041c76
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)75958853
Subject
- COMPUTERS -- Internet | Security
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer Science
- Computer hackers
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer security
- Computer security
- Computer security
- Engineering & Applied Sciences
- Hackers
- Hackers
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Hacking-for-dummies-by-Kevin-Beaver--foreword/0JKDkQGaJc8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Hacking-for-dummies-by-Kevin-Beaver--foreword/0JKDkQGaJc8/">Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/portal/Hacking-for-dummies-by-Kevin-Beaver--foreword/0JKDkQGaJc8/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/portal/Hacking-for-dummies-by-Kevin-Beaver--foreword/0JKDkQGaJc8/">Hacking for dummies, by Kevin Beaver ; foreword by Stuart McClure</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>