Prix bas
CHF35.10
Habituellement expédié sous 2 à 4 semaines.
Informationen zum Autor Kevin Beaver is an information security guru and has worked in the industry for more than three decades as a consultant, writer, and speaker. He earned his master's degree in Management of Technology at Georgia Tech. Klappentext Think like a hacker to lock down your data In the digital world, putting yourself in your enemy's shoes might just save your assets one day. Hacking For Dummies teaches you how to simulate attacks on your devices and your network, so you can find security holes before the real attackers do. You'll learn how to hack Windows® and Linux®, breach databases, and intercept messages. Then, you'll discover how to plug the holes you find, so you can rest easy, knowing that you out-hacked the hackers and secured your valuable data. Inside... Developing a hacker mindset Setting up solid security tests Learning about Windows® 10 & 11 security issues Locking down remote workstations Hacking users Testing web apps Patching security issues Generating ongoing security buy-in Zusammenfassung Learn to think like a hacker to secure your own systems and dataYour smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong.Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security* Use ongoing security checkups to continually ensure that your data is safe from hackersPerfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe. Inhaltsverzeichnis Introduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 25 Chapter 3: Developing Your Security Testing Plan 37 Chapter 4: Hacking Methodology 49 Part 2: Putting Security Testing in Motion 59 Chapter 5: Information Gathering 61 Chapter 6: Social Engineering 69 Chapter 7: Physical Security 87 Chapter 8: Passwords 99 Part 3: Hacking Network Hosts 129 Chapter 9: Network Infrastructure Systems 131 Chapter 10: Wireless Networks 165 Chapter 11: Mobile Devices 193 Part 4: Hacking Operating Systems 205 Chapter 12: Windows 207 Chapter 13: Linux and macOS 233 Part 5: Hacking Applications 257 Chapter 14: Communication and Messaging Systems 259 Chapter 15: Web Applications and Mobile Apps 283 Chapter 16: Databases and Storage Systems 309 Part 6: Security Testing Aftermath 321 Chapter 17: Reporting Your Results 323 Chapter 18: Plugging Your Security Holes 329 Chapter 19: Managing Security Processes 337 Part 7: The Part of Tens 345 Chapter 20: Ten Tips for Getting Security Buy-In 347 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353 Chapter 22: Ten Deadly Mistakes 357 Appendix: Tools and Resources 363 Index 379 ...
Auteur
Kevin Beaver is an information security guru and has worked in the industry for more than three decades as a consultant, writer, and speaker. He earned his master's degree in Management of Technology at Georgia Tech.
Texte du rabat
Think like a hacker to lock down your data
In the digital world, putting yourself in your enemy's shoes might just save your assets one day. Hacking For Dummies teaches you how to simulate attacks on your devices and your network, so you can find security holes before the real attackers do. You'll learn how to hack Windows® and Linux®, breach databases, and intercept messages. Then, you'll discover how to plug the holes you find, so you can rest easy, knowing that you out-hacked the hackers and secured your valuable data. Inside...
Résumé
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more. You'll find out how to: Stay on top of the latest security weaknesses that could affect your business's security setup Use freely available testing tools to "penetration test" your network's security * Use ongoing security checkups to continually ensure that your data is safe from hackers Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.
Contenu
Introduction 1
Part 1: Building the Foundation for Security Testing 5
Chapter 1: Introduction to Vulnerability and Penetration Testing 7
Chapter 2: Cracking the Hacker Mindset 25
Chapter 3: Developing Your Security Testing Plan 37
Chapter 4: Hacking Methodology 49
Part 2: Putting Security Testing in Motion 59
Chapter 5: Information Gathering 61
Chapter 6: Social Engineering 69
Chapter 7: Physical Security 87
Chapter 8: Passwords 99
Part 3: Hacking Network Hosts 129
Chapter 9: Network Infrastructure Systems 131
Chapter 10: Wireless Networks 165
Chapter 11: Mobile Devices 193
Part 4: Hacking Operating Systems 205
Chapter 12: Windows 207
Chapter 13: Linux and macOS 233
Part 5: Hacking Applications 257
Chapter 14: Communication and Messaging Systems 259
Chapter 15: Web Applications and Mobile Apps 283
Chapter 16: Databases and Storage Systems 309
Part 6: Security Testing Aftermath 321
Chapter 17: Reporting Your Results 323
Chapter 18: Plugging Your Security Holes 329
Chapter 19: Managing Security Processes 337
Part 7: The Part of Tens 345
Chapter 20: Ten Tips for Getting Security Buy-In 347
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 353
Chapter 22: Ten Deadly Mistakes 357
Appendix: Tools and Resources 363
Index 379