- Paperback: 408 pages
- Publisher: For Dummies; 3 edition (January 12, 2010)
- Language: English
- ISBN-10: 0470550937
- ISBN-13: 978-0470550939
- Product Dimensions: 7.5 x 0.9 x 9.2 inches
- Shipping Weight: 1.2 pounds (View shipping rates and policies)
- Average Customer Review: 50 customer reviews
- Amazon Best Sellers Rank: #1,278,336 in Books (See Top 100 in Books)
Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.
To get the free app, enter your mobile phone number.
Hacking For Dummies 3rd Edition
Use the Amazon App to scan ISBNs and compare prices.
Fulfillment by Amazon (FBA) is a service we offer sellers that lets them store their products in Amazon's fulfillment centers, and we directly pack, ship, and provide customer service for these products. Something we hope you'll especially enjoy: FBA items qualify for FREE Shipping and Amazon Prime.
If you're a seller, Fulfillment by Amazon can help you increase your sales. We invite you to learn more about Fulfillment by Amazon .
See the Best Books of 2018 So Far
Looking for something great to read? Browse our editors' picks for the best books of the year so far in fiction, nonfiction, mysteries, children's books, and much more.
Customers who viewed this item also viewed
Customers who bought this item also bought
'...it is easy to read, the presentation is clear and uncluttered, it caters for a variety of audiences...' (BCS.org, February 2010).
From the Back Cover
Get out your white hat and learn where your systems may be vulnerable
You're a good guy or gal, so why do you need to learn how to hack? Because the only way to be sure your systems are secure is to find out how the bad guys work and examine your defenses from their point of view. This guide shows you how, explains common attacks, tells you what to look for, and gives you the tools to safeguard your sensitive business information.
Build the foundation — understand the value of ethical hacking, what's involved, and the malicious hacker's mindset
Games people play — discover how hackers use social engineering to breach security and what to do about it
It's the network — explore common network vulnerabilities and the creative ways they're exploited
Down and dirty OS hacking — learn how Windows, Linux, and Novell NetWare are being attacked and how to scan for vulnerabilities
Sneak attacks — see why applications, especially Web apps, are vulnerable and how to protect them
Get the message — prepare for attacks on e-mail, IM, and VoIP systems
Tools of the trade — learn about Metasploit, BackTrack, and other important security testing tools
Now what? — find out how to use the information you gather to minimize business risks
Open the book and find:
What makes a hacker hack
Why you need to hack your systems
How to gain management's approval for your ethical hacking tests
Countermeasures to common attacks
Linux and Novell NetWare risks
Techniques for defending databases
How wireless LANs are compromised
Ten deadly mistakes to avoid
Use the latest ethical hacking methods and tools
Test your Windows or Linux systems
Hack databases, VoIP systems, and Web applications
Report vulnerabilities and improve information security
Top customer reviews
There was a problem filtering reviews right now. Please try again later.
As it is, Kevin Beaver presents us with an excellent primer on how to announce, initiate, and conduct penetration tests within your organization. I say within but in fact he includes instructions on how to test systems from the outside as well.
The first part is titled "Building the Foundations of Ethical Hacking". It is vital. You simply cannot begin breaking into networks without letting people know what you are doing, especially in the United States where prosecutors are joyfully sending people to jail on felony charges for breaking privacy laws.
You should first plan your hacking tests, determine how far you are willing to go, balance the need to test with the risk that testing could damage the target system, or at least disrupt access. Then take your plan and have it authorized by the appropriate managers. If the organization wants you to conduct a stealth test, you should nevertheless get the OK from a few senior managers in IT and other departments.
Part Two gives an overview of social engineering hacks, i.e. circumventing security by getting people with authorized access to let you in, for instance by posing as tech support and getting people to reveal their password.
Parts one and two will stay relevant for many years because they deal with people rather than specific technologies.
Parts three to six are more hands on and describe tools you can use to hack into operating systems and networks. Beaver covers Windows, Linux, and Novell. Much of what you find in the Linux sections applies to any flavour of Unix. Some of the tools described are freely available while others are for-purchase security tools. Part seven, the traditional For Dummies "Parts of Ten" section sums everything up nicely.
Overall, Hacking for Dummies in an excellent introduction to hands-on IT security testing for organization.
Vincent Poirier, Tokyo