Learn to: Defend against the latest Windows® 8 and Linux® hacks Develop an effective ethical hacking plan Protect web applications, databases, laptops, and smartphones Use the latest testing tools and techniques Are you a defender of systems? Then you need this book! Learn how to ward off attacks Until you can think like a bad guy and recognize the vulnerabilities in your systems, you can't build an effective plan to keep your information secure. This book helps you stay on top of the security game! Here's just what you need to know about penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking. How a hacker thinks -- explore the malicious mindset and learn what steps to take as you plan your ethical hacking program Recognize common tricks -- learn about social engineering, password-cracking techniques, and physical security issues Get rolling -- choose the right tools and set your plan in motion Demystify mobile security -- learn to protect smartphones, laptops, and tablets used in your organization Protect the network -- discover weaknesses in TCP/IP and wireless networks and learn to secure them Lock your Windows -- fortify your Windows and Linux operating systems against attack App attack -- find the vulnerabilities in business applications such as e-mail, web apps, and databases Use what you learn -- correct the flaws you find and keep looking for more Open the book and find: Fundamentals of ethical hacking The weak links in most security programs Countermeasures to network vulnerabilities Help establishing an ongoing program How to develop reports on the information you gather Tips for selling your plan to management Case studies of common hack attacks A list of ethical hacking tools and resources.
Hacking for Dummies®