Hacking for Dummies
Hacking for Dummies
Click to enlarge
Author(s): Beaver, Kevin
ISBN No.: 9781119872191
Pages: 416
Year: 202204
Format: Trade Paper
Price: $ 44.15
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Introduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363 Index 379 rueFalseFalseTrue[FileName][path.GetFileNameWithoutExtension(item)][ISBN_Number][FileName.Split("."c)(0)]TrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseTrueTrueFalseTrueSystem.ActivitiesSystem.Activities.StatementsSystem.Activities.


ExpressionsSystem.Activities.ValidationSystem.Activities.XamlIntegrationMicrosoft.VisualBasic.ActivitiesSystemSystem.Collections.


GenericSystem.DataSystem.DiagnosticsSystem.IOSystem.LinqSystem.Management.AutomationSystem.Net.


MailSystem.XmlSystem.Xml.LinqUiPath.LibrarySystem.Windows.MarkupSystem.ActivitiesmscorlibSystem.


DataSystemSystem.CoreSystem.Management.AutomationSystem.XmlSystem.Xml.LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.


XamlTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalseTrueFalse[det]TrueFalseTrueFalseFalseTrueTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueFalseFalseFalseFalseFalseTrueFalseTrueTrueFalseFalseTrueTrueFalseTrueTrueTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseFalseTrueFalseTrueFalseFalseFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueTrueFalseSystem.ActivitiesSystem.Activities.StatementsSystem.Activities.ExpressionsSystem.Activities.ValidationSystem.


Activities.XamlIntegrationMicrosoft.VisualBasic.ActivitiesSystemSystem.Collections.GenericSystem.DataSystem.DiagnosticsSystem.


IOSystem.LinqSystem.Management.AutomationSystem.Net.MailSystem.XmlSystem.Xml.


LinqUiPath.LibrarySystem.Windows.MarkupSystem.ActivitiesmscorlibSystem.DataSystemSystem.CoreSystem.Management.


AutomationSystem.XmlSystem.Xml.LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.XamlFalseFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseTrueFalse0-7645-5985-0/978-0-7645-5985-3 (Paper)0-470-22213-1/978-0-470-22213-3 (E-books - MobiPocket)0-471-75096-4/978-0-471-75096-3 (E-books - Adobe PDF)1-118-05418-0/978-1-118-05418-5 (E-books - ePub)TrueFalseSystem.ActivitiesSystem.Activities.


StatementsSystem.Activities.ExpressionsSystem.Activities.ValidationSystem.Activities.XamlIntegrationMicrosoft.VisualBasic.


ActivitiesSystemSystem.Collections.GenericSystem.DataSystem.DiagnosticsSystem.IOSystem.LinqSystem.Management.


AutomationSystem.Net.MailSystem.XmlSystem.Xml.LinqUiPath.LibrarySystem.Windows.


MarkupSystem.ActivitiesmscorlibSystem.DataSystemSystem.CoreSystem.Management.AutomationSystem.XmlSystem.Xml.


LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.XamlTrueFalseTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueFalseFalseFalseFalseFalseTrueFalseTrueTrueFalseFalseTrueTrueFalseTrueTrueTrueFalseTrueFalseTrueFalseTrueFalseTrueTrueFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseFalseTrueFalseTrueFalseFalseFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseFalseTrueFalseTrueFalseFalseTrueTrueFalseFalseTrueTrueFalseTrueFalseTrueTrueFalseTrueFalseTrueTrueFalseSystem.ActivitiesSystem.Activities.StatementsSystem.Activities.ExpressionsSystem.


Activities.ValidationSystem.Activities.XamlIntegrationMicrosoft.VisualBasic.ActivitiesSystemSystem.Collections.GenericSystem.


DataSystem.DiagnosticsSystem.IOSystem.LinqSystem.Management.AutomationSystem.Net.MailSystem.


XmlSystem.Xml.LinqUiPath.LibrarySystem.Windows.MarkupSystem.ActivitiesmscorlibSystem.DataSystemSystem.


CoreSystem.Management.AutomationSystem.XmlSystem.Xml.LinqUiPath.LibraryPresentationFrameworkWindowsBasePresentationCoreSystem.XamlFalseFalseFalseFalseTrueFalseFalseTrueFalseFalseFalseTrueFalseFalseTrueFalseFalseTrueFalseTrueTrueFalseFalseTrueTrueFalseFalseTrueFalseTruentroduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363 Index 379 ntroduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363 Index 379 ntroduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...