Home | Best Seller | FAQ | Contact Us
Browse
Art & Photography
Biographies & Autobiography
Body,Mind & Health
Business & Economics
Children's Book
Computers & Internet
Cooking
Crafts,Hobbies & Gardening
Entertainment
Family & Parenting
History
Horror
Literature & Fiction
Mystery & Detective
Nonfiction
Professional & Technology
Reference
Religion
Romance
Science
Science Fiction & Fantasy
Sports & Outdoors
Travel & Geography
   Book Info

enlarge picture

Hacking for Dummies  
Author: Kevin Beaver, Stuart McClure
ISBN: 076455784X
Format: Handover
Publish Date: June, 2005
 
     
     
   Book Review


Review
“…a good read…a price well-worth paying, because such works are invaluable…” (InfoSecurity News Magazine, August 2004)

“…an excellent aide…” (PC Home, August 2004)

“…should be of interest to both ethical and malicious hackers…” (Publishing News, 22nd March 2004)


Review
“…a good read…a price well-worth paying, because such works are invaluable…” (InfoSecurity News Magazine, August 2004)

“…an excellent aide…” (PC Home, August 2004)

“…should be of interest to both ethical and malicious hackers…” (Publishing News, 22nd March 2004)


Book Description
"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing
* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized


Download Description
Ethical hacking is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing
* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized


From the Back Cover
Find out if your system is vulnerable to hack attacks! "The coverage of security topics in this book can help you avoid a hack attack." — Stuart McClure "To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat hacker," exploring your own system for vulnerabilities the unscrupulous hacker could exploit. And it’s loaded with tips, suggestions, and recommendations to help you plug any holes you find. The Dummies Way Explanations in plain English "Get in, get out" information Icons and other navigational aids Tear-out cheat sheet Top ten lists A dash of humor and fun Discover how to: Recognize and counter common hack attacks Gain support for your security plan Test the security of Windows®, Linux®, NetWare®, and more Report your finds to upper management Protect your network infrastructure


About the Author
Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.




Hacking for Dummies

FROM OUR EDITORS

The Barnes & Noble Review
If you have a high-speed Internet connection, you are being attacked. Wouldn￯﾿ᄑt you like to know how? Hack yourself. Time was, you￯﾿ᄑd practically need to dive into the Matrix to learn how. But now, there￯﾿ᄑs Hacking for Dummies.

IT security pro Kevin Beaver teaches the most useful ethical hacking techniques as simply as is humanly possible. Physical security (could somebody walk up to your server and break in?). Passwords (easier to crack than you thought). Wireless LANs (who￯﾿ᄑs picking up your broadcasts?). Email. Web applications. P2P holes. Trojan horses.

It￯﾿ᄑs not enough to know where you￯﾿ᄑre at risk. Beaver shows what to do about it: how to report what you￯﾿ᄑve learned, plug the holes, and start managing security -- instead of letting it manage you. Bill Camarda

Bill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2003 and Upgrading & Fixing Networks for Dummies, Second Edition.

FROM THE PUBLISHER

"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing
* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper management, managing security changes, automating the ethical hacking process, and training end-users to avoid being victimized

Author Biography: Kevin Beaver is a consultant who specializes in security assessments and incident response. He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.

SYNOPSIS

Find out if your system is vulnerable to hack attacks!

"The coverage of security topics in this book can help you avoid a hack attack." — Stuart McClure

"To catch a thief, think like a thief." Here’s the guide that will help you do just that! It shows you how to become a "white hat hacker," exploring your own system for vulnerabilities the unscrupulous hacker could exploit. And it’s loaded with tips, suggestions, and recommendations to help you plug any holes you find.

The Dummies Way Explanations in plain English "Get in, get out" information Icons and other navigational aids Tear-out cheat sheet Top ten lists A dash of humor and fun

Discover how to: Recognize and counter common hack attacks Gain support for your security plan Test the security of Windows®, Linux®, NetWare®, and more Report your finds to upper management Protect your network infrastructure

     



Home | Private Policy | Contact Us
@copyright 2001-2005 ReadingBee.com