Cargando…

Hacking for Dummies.

Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnera...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Beaver, Kevin
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated, 2018.
Edición:6th ed.
Colección:--For dummies.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mu 4500
001 OR_on1043645788
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 180707s2018 nju ob 001 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d IDB  |d OCLCQ  |d LVT  |d TEFOD  |d OCLCF  |d OCLCO  |d AU@  |d OCLCQ  |d UMI  |d YOU  |d COO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1043914419  |a 1111653532  |a 1135503636 
020 |a 9781119485513 
020 |a 1119485517 
020 |a 9781119485544  |q (electronic bk.) 
020 |a 1119485541  |q (electronic bk.) 
020 |z 9781119485476 
020 |z 1119485479 
035 |a (OCoLC)1043645788  |z (OCoLC)1043914419  |z (OCoLC)1111653532  |z (OCoLC)1135503636 
037 |a B031F3B8-7FB1-4956-B9A0-F6B42FFBAC18  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25  |b .B438 2018eb 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Beaver, Kevin. 
245 1 0 |a Hacking for Dummies. 
250 |a 6th ed. 
260 |a Newark :  |b John Wiley & Sons, Incorporated,  |c 2018. 
300 |a 1 online resource (446 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a --For dummies 
588 0 |a Print version record. 
505 0 |a Intro; Table of Contents; Introduction; About This Book; Foolish Assumptions; Icons Used in This Book; Beyond the Book; Where to Go from Here; Part 1: Building the Foundation for Security Testing; Chapter 1: Introduction to Vulnerability and Penetration Testing; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Following the Security Assessment Principles; Using the Vulnerability and Penetration Testing Process; Chapter 2: Cracking the Hacker Mindset. 
505 8 |a What You're Up AgainstWho Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Security Testing Plan; Establishing Your Goals; Determining Which Systems to Test; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System; Part 2: Putting Security Testing in Motion; Chapter 5: Information Gathering. 
505 8 |a Gathering Public InformationMapping the Network; Chapter 6: Social Engineering; Introducing Social Engineering; Starting Your Social Engineering Tests; Knowing Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 7: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 8: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password Cracking Countermeasures; Securing Operating Systems. 
505 8 |a Part 3: Hacking Network HostsChapter 9: Network Infrastructure Systems; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 10: Wireless Networks; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless Networks; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 11: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords. 
505 8 |a Cracking Phones and TabletsPart 4: Hacking Operating Systems; Chapter 12: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information About Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 13: Linux and macOS; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information About Your System Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the .rhosts and hosts.equiv Files; Assessing the Security of NFS; Checking File Permissions. 
500 |a Finding Buffer Overflow Vulnerabilities. 
504 |a Includes bibliographical references and index. 
520 |a Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker & rsquo;s mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you & rsquo;re worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently & mdash;with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There & rsquo;s no such thing as being too safe & mdash;and this resourceful guide helps ensure you & rsquo;re protected. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hackers  |2 fast 
776 0 8 |i Print version:  |a Beaver, Kevin.  |t Hacking for Dummies.  |d Newark : John Wiley & Sons, Incorporated, ©2018  |z 9781119485476 
830 0 |a --For dummies. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119485476/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP