Beställningsvara. Skickas inom 7-10 vardagar. Fri frakt för medlemmar vid köp för minst 249 kr.
Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data. You won't learn how to steal your neighbors' Wi-Fi, but you will gain the skills to keep nosy hackers out of your systems and applications. With clear, jargon-free explanations, you'll learn to recognize cyberthreats and keep your information safe. This updated edition includes new content on AI, the Internet of Things (IoT), and the security implications of hybrid work. Understand the tools hackers use to steal sensitive data from individuals and businessesDiscover methods of protecting your information—including improving your security, recognizing phishing scams, and moreAssess your current network and cloud configurations from a hacker's perspective using proven vulnerability and penetration testing techniquesDefend against AI-generated scams, lost devices, and other common threatsHacking For Dummies is for anyone looking to protect their devices from hacking—at home, at the office, or anywhere in-between.
Kevin Beaver is an information security consultant, writer, and professional speaker with nearly four decades of experience in information technology. He’s the founder of Principle Logic, LLC, an independent information security company that focuses on vulnerability and penetration testing, security operations reviews, and virtual CISO consulting services.
Introduction 1Part 1: Building the Foundation for Security Testing 5Chapter 1: Introduction to Vulnerability and Penetration Testing 7Chapter 2: Cracking the Hacker Mindset 27Chapter 3: Developing Your Security Testing Plan 41Chapter 4: Hacking Methodology 55Part 2: Putting Security Testing in Motion 67Chapter 5: Information Gathering 69Chapter 6: Social Engineering 79Chapter 7: Physical Security 97Chapter 8: Passwords 109Part 3: Hacking Network Hosts 141Chapter 9: Network Infrastructure Systems 143Chapter 10: Wireless Networks 175Chapter 11: Mobile Devices 203Part 4: Hacking Operating Systems 217Chapter 12: Windows 219Chapter 13: Linux and macOS 247Part 5: Hacking Applications 271Chapter 14: Email Systems 273Chapter 15: Web Applications and Mobile Apps 293Chapter 16: Databases and Storage Systems 321Part 6: Security Testing Aftermath 233Chapter 17: Reporting Your Results 335Chapter 18: Plugging Your Security Holes 343Chapter 19: Managing Security Processes 351Part 7: The Part of Tens 259Chapter 20: Ten Tips for Getting Security Buy-In 361Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 367Chapter 22: Ten Deadly Mistakes. 371Index 377
Thomas Blomberg, Julie Brancale, Kevin Beaver, William Bales, College of Criminology and Criminal Justice) Blomberg, Thomas (Florida State University, USA) Brancale, Julie (Florida State University, USA) Beaver, Kevin (Florida State University, USA) Bales, William (Florida State University
Thomas Blomberg, Julie Brancale, Kevin Beaver, William Bales, College of Criminology and Criminal Justice) Blomberg, Thomas (Florida State University, USA) Brancale, Julie (Florida State University, USA) Beaver, Kevin (Florida State University, USA) Bales, William (Florida State University
Thomas Blomberg, Julie Brancale, Kevin Beaver, William Bales, College of Criminology and Criminal Justice) Blomberg, Thomas (Florida State University, USA) Brancale, Julie (Florida State University, USA) Beaver, Kevin (Florida State University, USA) Bales, William (Florida State University
Thomas Blomberg, Julie Brancale, Kevin Beaver, William Bales, College of Criminology and Criminal Justice) Blomberg, Thomas (Florida State University, USA) Brancale, Julie (Florida State University, USA) Beaver, Kevin (Florida State University, USA) Bales, William (Florida State University