Wilmington Memorial Library

Hacking, by Kevin Beaver

Label
Hacking, by Kevin Beaver
Language
eng
Bibliography note
Includes bibliographical references and index
Illustrations
illustrations
Index
index present
Literary Form
non fiction
Main title
Hacking
Nature of contents
bibliography
Oclc number
1043392947
Responsibility statement
by Kevin Beaver
Series statement
For dummies
Summary
"Be a good guy by thinking like a bad guy. To outsmart a hacker, you must think like a hacker. Security expert Kevin Beaver shows you what motivates hackers and what they're looking for. He lets you in on the secrets of vulnerability and penetration testing, security best practices, and everything else you need to know to stop attackers before they cause problems for your business. Learn how to protect your servers and desktops, web applications, mobile devices, or your entire network"--Page 4 of cover
Table Of Contents
Part I: Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- Part II: Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- Part III: Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- Part IV: Hacking operating systems. Windows ; Linux and macOS -- Part V: Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- Part VI: Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- Part VII: The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes -- Appendix: tools and resources
Classification
Content
Mapped to

Incoming Resources

  • Has instance
    1