Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Hacking For Dummies Paperback – January 12, 2010

ISBN-13: 978-0470550939 ISBN-10: 0470550937 Edition: 3rd

12 New from $7.11 18 Used from $4.99
Amazon Price New from Used from
Paperback
"Please retry"
$7.11 $4.99

There is a newer edition of this item:

Hacking For Dummies
$20.00
(19)
In Stock.
Free Two-Day Shipping for College Students with Amazon Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student

NO_CONTENT_IN_FEATURE

Protect Yourself from Hacks
Learn valuable techniques to help protect your information [PDF].

Product Details

  • Paperback: 408 pages
  • Publisher: For Dummies; 3 edition (January 12, 2010)
  • Language: English
  • ISBN-10: 0470550937
  • ISBN-13: 978-0470550939
  • Product Dimensions: 7.5 x 0.9 x 9.2 inches
  • Shipping Weight: 1.2 pounds
  • Average Customer Review: 4.2 out of 5 stars  See all reviews (26 customer reviews)
  • Amazon Best Sellers Rank: #188,175 in Books (See Top 100 in Books)

Editorial Reviews

Review

‘…it is easy to read, the presentation is clear and uncluttered, it caters for a variety of audiences…' (BCS.org, February 2010).

From the Back Cover

Get out your white hat and learn where your systems may be vulnerable

You're a good guy or gal, so why do you need to learn how to hack? Because the only way to be sure your systems are secure is to find out how the bad guys work and examine your defenses from their point of view. This guide shows you how, explains common attacks, tells you what to look for, and gives you the tools to safeguard your sensitive business information.

  • Build the foundation — understand the value of ethical hacking, what's involved, and the malicious hacker's mindset

  • Games people play — discover how hackers use social engineering to breach security and what to do about it

  • It's the network — explore common network vulnerabilities and the creative ways they're exploited

  • Down and dirty OS hacking — learn how Windows, Linux, and Novell NetWare are being attacked and how to scan for vulnerabilities

  • Sneak attacks — see why applications, especially Web apps, are vulnerable and how to protect them

  • Get the message — prepare for attacks on e-mail, IM, and VoIP systems

  • Tools of the trade — learn about Metasploit, BackTrack, and other important security testing tools

  • Now what? — find out how to use the information you gather to minimize business risks

Open the book and find:

  • What makes a hacker hack

  • Why you need to hack your systems

  • How to gain management's approval for your ethical hacking tests

  • Countermeasures to common attacks

  • Linux and Novell NetWare risks

  • Techniques for defending databases

  • How wireless LANs are compromised

  • Ten deadly mistakes to avoid

Learn to:

  • Use the latest ethical hacking methods and tools

  • Test your Windows or Linux systems

  • Hack databases, VoIP systems, and Web applications

  • Report vulnerabilities and improve information security


More About the Author

I am an independent information security consultant, expert witness, author, and professional speaker with over 23 years of experience in IT - the last 17 of which I've dedicated to information security. Before starting Principle Logic in 2001, I served in various information technology and security roles for several healthcare, e-commerce, financial firms, educational institutions, and consulting organizations.

I have appeared on CNN television as an information security expert and have been quoted in the Wall Street Journal, Entrepreneur Magazine, Fortune Small Business, Women's Health and Inc. Magazine's technology site IncTechnology.com. My work has also been referenced by the PCI Council in their Data Security Standard Wireless Guidelines. I have presented at seminars and conferences over 200 times and have been a top-rated information security speaker at shows for Gartner, TechTarget, RSA, CSI, SecureWorld Expo and The IIA. I focus my speaking services on information security seminars, panels and keynoting IT and information security-related shows. Additionally, I've performed over three dozen webcasts for TechTarget, Ziff-Davis and other publishers.

I am author/co-author of 10 information security books including Hacking For Dummies, Hacking Wireless Networks For Dummies, Securing the Mobile Enterprise For Dummies, and Laptop Encryption For Dummies (all by Wiley) as well as The Definitive Guide to Email Management and Security (Realtimepublishers.com) and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach). In addition, I am technical editor of the book Network Security For Dummies (Wiley) as well as over a dozen books and whitepapers for Realtimepublishers.com.

I have written 27 whitepapers and over 600 articles on information security. I am a regular contributor of information security content for SearchEnterpriseDesktop.com, SearchCompliance.com, SearchWindowsServer.com, SearchWinIT.com and Security Technology Executive magazine. I have also written articles for Information Security Magazine, CSOOnline.com, and Computerworld.com. In addition, I'm the creator and author of the Security On Wheels information security audio programs providing security learning for IT professionals on the go as well as its associated blog here at securityonwheels.com/blog. You can also view my videos on YouTube at www.youtube.com/principlelogic, follow me on Twitter at www.twitter.com/kevinbeaver and link to me on LinkedIn at www.linkedin.com/in/kevinbeaver.

I earned my bachelor's degree in Computer Engineering Technology from Southern College of Technology and my master's degree in Management of Technology from Georgia Tech. I also hold the Certified Information Systems Security Professional (CISSP) certification which I obtained in 2001.

Customer Reviews

I will be advising my friends to pick this book up.
Darrius Hodges
IF YOU WANT TO LEARN 'HOW' TO BE AN ETHICAL HACKER DON'T BUY THIS BOOK This book just tells you what do do WITH hacking skills.
Random
I was amazed at the level of detail found in a "for dummies" book.
Daren K. Presbitero

Most Helpful Customer Reviews

11 of 11 people found the following review helpful By Mike Tremblay, CISSP, GCIH on September 10, 2011
Format: Paperback Verified Purchase
I actually got to read this book for free online via work. However, I enjoyed it so much that I bought a copy so that I could try some of the tools out on my home network. (Word of warning: Be careful if you use these tools even on your home network, I use a separate set of computers that are isolated from the internet and that I don't mind reloading from scratch if things go wrong.) I have liked most of the Dummies series of books that I've read as they're extremely easy reading and lay a good foundation on the subject most of the time and this one was no different. You're not going to become a hacking expert reading this and it doesn't really cover programming or get very technical. What it does is give you a great overview of hacking methodologies and introduce you to a lot of the basic tools used such as nmap, superscan, metasploit, netcat, etc. It covers a lot of the major subjects such as social engineering, physical security, OS vulnerabilites, wireless vulnerabilities, and different types of attacks as well as basic countermeasures that can be taken to help protect your networks. There's also a section on how to get the all important management buy in, if you're tasked with implementing any type of security at work then this is very important. At the back is a great appendix of tools and resources which is another reason I bought this book, it can serve as a great reference.
2 Comments Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
7 of 7 people found the following review helpful By Vincent Poirier on October 31, 2011
Format: Paperback Verified Purchase
Hacking for Dummies could have been more accurately titled "Penetration Testing For Dummies" but that would have made for a less dramatic title and maybe cost it a few sales.

As it is, Kevin Beaver presents us with an excellent primer on how to announce, initiate, and conduct penetration tests within your organization. I say within but in fact he includes instructions on how to test systems from the outside as well.

The first part is titled "Building the Foundations of Ethical Hacking". It is vital. You simply cannot begin breaking into networks without letting people know what you are doing, especially in the United States where prosecutors are joyfully sending people to jail on felony charges for breaking privacy laws.

You should first plan your hacking tests, determine how far you are willing to go, balance the need to test with the risk that testing could damage the target system, or at least disrupt access. Then take your plan and have it authorized by the appropriate managers. If the organization wants you to conduct a stealth test, you should nevertheless get the OK from a few senior managers in IT and other departments.

Part Two gives an overview of social engineering hacks, i.e. circumventing security by getting people with authorized access to let you in, for instance by posing as tech support and getting people to reveal their password.

Parts one and two will stay relevant for many years because they deal with people rather than specific technologies.

Parts three to six are more hands on and describe tools you can use to hack into operating systems and networks. Beaver covers Windows, Linux, and Novell. Much of what you find in the Linux sections applies to any flavour of Unix.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
17 of 21 people found the following review helpful By Random on February 20, 2012
Format: Paperback Verified Purchase
So I'm going to split this review into a few different parts:

1. IF YOU WANT TO LEARN 'HOW' TO BE AN ETHICAL HACKER DON'T BUY THIS BOOK

This book just tells you what do do WITH hacking skills. If you want to learn how to hack because: You're computer guru, Trying to improve your home security, looking to get into the Security Consultant business, THIS BOOK IS NOT FOR YOU! I CANNOT STRESS THIS MORE!

2. IF YOU ARE A SECURITY PROFESSIONAL KNOW HOW TO HACK BUT DON'T KNOW WHERE TO GO NEXT

This would be a good book. It has tons of info on what to make your system secure with.

3. IF YOU INTEND ON DOING STUFF THAT IS ILLEGAL

Think about it man. Prison would be waste of your talent. Do something awesome with your life, and help people be safer from the black hats. Security Consultants get A LOT of money, and LEGALLY.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By Daren K. Presbitero on January 12, 2012
Format: Paperback
I have a bunch of jr. cybersecurity engineers reporting to me and we have a project which calls for penetration testing and vulnerability assessments. I know the basics of these types of services but was amazed when these kids were all using their netbooks with tools I couldn't even pronounce to hack our systems in our office to show me what they could do. I knew then that I needed a book to get me up to speed, fast! Enter Hacking for dummies. This book took me through not only the basics of networking and software applications (which I had knowledge of already), but it showed me the tools that hackers use to exploit these attack vectors and how to use them! Having all of the popular tools listed in this book means I have a go-to book available as a desktop reference in case I need it. I was amazed at the level of detail found in a "for dummies" book. I enjoyed the section on network attacks using arp poisoning. Very good job Mr. Beaver.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
3 of 4 people found the following review helpful By Art on April 18, 2013
Format: Paperback Verified Purchase
I thought that I would learn more about improving my own computer's security, but this book is about protecting systems. I'm sure it would be valuable to a systems administrator.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Most Recent Customer Reviews


What Other Items Do Customers Buy After Viewing This Item?