Review
“…a good read…a price well-worth paying, because such works are invaluable…” (InfoSecurity News Magazine, August 2004)
“…an excellent aide…” (PC Home, August 2004)
“…should be of interest to both ethical and malicious hackers…” (Publishing News, 22nd March 2004)
Review
“…a good read…a price well-worth paying, because such works are invaluable…” (InfoSecurity News Magazine, August 2004)
“…an excellent aide…” (PC Home, August 2004)
“…should be of interest to both ethical and malicious hackers…” (Publishing News, 22nd March 2004)
Book Description
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing
* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized
Download Description
Ethical hacking is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing
* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized
From the Back Cover
Find out if your system is vulnerable to hack attacks! "The coverage of security topics in this book can help you avoid a hack attack." Stuart McClure "To catch a thief, think like a thief." Heres the guide that will help you do just that! It shows you how to become a "white hat hacker," exploring your own system for vulnerabilities the unscrupulous hacker could exploit. And its loaded with tips, suggestions, and recommendations to help you plug any holes you find. The Dummies Way Explanations in plain English "Get in, get out" information Icons and other navigational aids Tear-out cheat sheet Top ten lists A dash of humor and fun Discover how to: Recognize and counter common hack attacks Gain support for your security plan Test the security of Windows®, Linux®, NetWare®, and more Report your finds to upper management Protect your network infrastructure
About the Author
Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.
Hacking for Dummies FROM OUR EDITORS
The Barnes & Noble Review
If you have a high-speed Internet connection, you are being attacked. Wouldnᄑt you like to know how? Hack yourself. Time was, youᄑd practically need to dive into the Matrix to learn how. But now, thereᄑs Hacking for Dummies.
IT security pro Kevin Beaver teaches the most useful ethical hacking techniques as simply as is humanly possible. Physical security (could somebody walk up to your server and break in?). Passwords (easier to crack than you thought). Wireless LANs (whoᄑs picking up your broadcasts?). Email. Web applications. P2P holes. Trojan horses.
Itᄑs not enough to know where youᄑre at risk. Beaver shows what to do about it: how to report what youᄑve learned, plug the holes, and start managing security -- instead of letting it manage you. Bill Camarda
Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.
FROM THE PUBLISHER
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing
* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized
Author Biography: Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.
SYNOPSIS
Find out if your system is vulnerable to hack attacks!
"The coverage of security topics in this book can help you avoid a hack attack." Stuart McClure
"To catch a thief, think like a thief." Heres the guide that will help you do just that! It shows you how to become a "white hat hacker," exploring your own system for vulnerabilities the unscrupulous hacker could exploit. And its loaded with tips, suggestions, and recommendations to help you plug any holes you find.
The Dummies Way Explanations in plain English "Get in, get out" information Icons and other navigational aids Tear-out cheat sheet Top ten lists A dash of humor and fun
Discover how to: Recognize and counter common hack attacks Gain support for your security plan Test the security of Windows®, Linux®, NetWare®, and more Report your finds to upper management Protect your network infrastructure