Hacking for Dummies
Resource Information
The instance Hacking for Dummies represents a material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library. This resource is a combination of several types including: Instance, Electronic.
The Resource
Hacking for Dummies
Resource Information
The instance Hacking for Dummies represents a material embodiment of a distinct intellectual or artistic creation found in Missouri University of Science & Technology Library. This resource is a combination of several types including: Instance, Electronic.
- Label
- Hacking for Dummies
- Note
- Finding Buffer Overflow Vulnerabilities
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset
- What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering
- Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems
- Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords
- Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions
- Control code
- 1043645788
- Dimensions
- unknown
- Edition
- 6th ed.
- Extent
- 1 online resource (446 pages)
- Form of item
- online
- Isbn
- 9781119485513
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- http://library.link/vocab/ext/overdrive/overdriveId
- b031f3b8-7fb1-4956-b9a0-f6b42ffbac18
- Record ID
- .b134240534
- Specific material designation
- remote
- System control number
- (OCoLC)1043645788
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/P17RtwhLHxw/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/P17RtwhLHxw/">Hacking for Dummies</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Hacking for Dummies
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.mst.edu/resource/P17RtwhLHxw/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.mst.edu/resource/P17RtwhLHxw/">Hacking for Dummies</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.mst.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.mst.edu/">Missouri University of Science & Technology Library</a></span></span></span></span></div>