سبد خرید  cart.gif |  حساب من |  تماس با ما |  راهنما     Search
موضوعات مرتبط
Cover image for product 1119154685
Hacking For Dummies, 5th Edition
Beaver
ISBN: 978-1-119-15468-6
Paperback
408 pages
January 2016
This is an out of Print Title.
  • Description
  • Table of Contents
  • Author Information
  • Reviews

Learn to:

  • Defend against the latest Windows ® 10 and Linux® hacks
  • Develop an effective security testing plan
  • Protect web applications, databases, laptops, servers, and smartphones
  • Use the latest testing tools and techniques

Protect your network against malicious attacks

Is hacking something left to the bad guys? Certainly not! If security assessments are on your to-do list, this book helps you identify vulnerabilities in your system and stay on top of the security game. Here's just what you need to defend your network environment—and all of the data it holds—against hacks, including the latest Windows 10 and Linux hacks.

  • Know your enemy — get in the malicious mindset and discover how to plan your security testing efforts throughout the security assessment process
  • Put your plan into motion — get familiar with several well-known and widely used hack attacks, like information gathering, social engineering, and cracking passwords
  • Improve communications — find out how networks are compromised by using specific methods of flawed network communications
  • Find your flaws — exploit well-known vulnerabilities in Windows, Mac OS X®, and Linux operating systems, take over operating systems remotely, and implement countermeasures to make your operating systems more secure
  • App attack — find the latest on hacking messaging systems, web applications, mobile apps, and databases

Open the book and find:

  • The fundamentals of vulnerability assessments and penetration testing
  • Common weak links in most security programs
  • How smartphones, tablets, and the Internet of Things can be exploited
  • Tips and tricks to perform common security tests against your business systems
  • How to develop reports on the information you gather to get management interested
  • Guidance on correcting the flaws you find—and how to keep looking for more
عناوین مرتبط
Networking / Security