John Wiley & Sons Hacking For Dummies Cover Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and deskt.. Product #: 978-1-119-87219-1 Regular price: $25.14 $25.14 In Stock

Hacking For Dummies

Beaver, Kevin

Cover

7. Edition June 2022
416 Pages, Softcover
General Reading

ISBN: 978-1-119-87219-1
John Wiley & Sons

Buy now

Price: 26,90 €

Price incl. VAT, excl. Shipping

Further versions

epubmobipdf

Learn to think like a hacker to secure your own systems and data

Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong.

Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.

You'll find out how to:
* Stay on top of the latest security weaknesses that could affect your business's security setup
* Use freely available testing tools to "penetration test" your network's security
* Use ongoing security checkups to continually ensure that your data is safe from hackers

Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.

Introduction 1

Part 1: Building the Foundation for Security Testing 5

Chapter 1: Introduction to Vulnerability and Penetration Testing 7

Chapter 2: Cracking the Hacker Mindset 25

Chapter 3: Developing Your Security Testing Plan 37

Chapter 4: Hacking Methodology 49

Part 2: Putting Security Testing in Motion 59

Chapter 5: Information Gathering 61

Chapter 6: Social Engineering 69

Chapter 7: Physical Security 87

Chapter 8: Passwords 99

Part 3: Hacking Network Hosts 129

Chapter 9: Network Infrastructure Systems 131

Chapter 10: Wireless Networks 165

Chapter 11: Mobile Devices 193

Part 4: Hacking Operating Systems 205

Chapter 12: Windows 207

Chapter 13: Linux and macOS 233

Part 5: Hacking Applications 257

Chapter 14: Communication and Messaging Systems 259

Chapter 15: Web Applications and Mobile Apps 283

Chapter 16: Databases and Storage Systems 309

Part 6: Security Testing Aftermath 321

Chapter 17: Reporting Your Results 323

Chapter 18: Plugging Your Security Holes 329

Chapter 19: Managing Security Processes 337

Part 7: The Part of Tens 345

Chapter 20: Ten Tips for Getting Security Buy-In 347

Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353

Chapter 22: Ten Deadly Mistakes 357

Appendix: Tools and Resources 363

Index 379
Kevin Beaver is an information security guru and has worked in the industry for more than three decades as a consultant, writer, and speaker. He earned his master's degree in Management of Technology at Georgia Tech.