Coverart for item
The Resource Hacking for dummies, by Kevin Beaver

Hacking for dummies, by Kevin Beaver

Label
Hacking for dummies
Title
Hacking for dummies
Statement of responsibility
by Kevin Beaver
Creator
Author
Subject
Genre
Language
eng
Summary
Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!
Member of
Cataloging source
CNKEY
http://library.link/vocab/creatorName
Beaver, Kevin
Dewey number
005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.9.A25
LC item number
B43 2013eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
Series statement
--For dummies
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Hackers
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer networks
  • Computer security
  • Hackers
Label
Hacking for dummies, by Kevin Beaver
Instantiates
Publication
Copyright
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources
Control code
933291620
Dimensions
unknown
Edition
5th edition.
Extent
1 online resource (xvi, 390 pages)
File format
unknown
Form of item
online
Isbn
9781119154686
Lccn
2015956627
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000749
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)933291620
Label
Hacking for dummies, by Kevin Beaver
Publication
Copyright
Antecedent source
unknown
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources
Control code
933291620
Dimensions
unknown
Edition
5th edition.
Extent
1 online resource (xvi, 390 pages)
File format
unknown
Form of item
online
Isbn
9781119154686
Lccn
2015956627
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
cl0500000749
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)933291620

Library Locations

    • Curtis Laws Wilson LibraryBorrow it
      400 West 14th Street, Rolla, MO, 65409, US
      37.955220 -91.772210
Processing Feedback ...