破解入门 第2版 Hacking For Dummies

分類: 图书,进口原版书,经管与理财 Business & Investing ,
作者: Kevin Beaver,Stuart McClure 著
出 版 社: John Wiley & Sons
出版时间: 2007-7-1字数:版次: 1页数: 388印刷时间: 2007/07/01开本:印次:纸张: 胶版纸I S B N : 9780470052358包装: 平装内容简介
Are you worried about external hackers and rogue insiders breaking into your systems? Whether it’s social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself—an ethical hacker.
Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You’ll discover how to:
Work ethically, respect privacy, and save your system from crashing;
Develop a hacking plan;
Treat social engineers and preserve their honesty;
Counter war dialing and scan infrastructures;
Understand the vulnerabilities of Windows, Linux, and Novell NetWare;
Prevent breaches in messaging systems, web applications, and databases;
Report your results and managing security changes;
Avoid deadly mistakes;
Get management involved with defending your systems.
As we enter into the digital era, protecting your systems and your company has never been more important. Don’t let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!
作者简介:
Kevin Beaver is an independent information security consultant, speaker, and expert witness with two decades of experience in the IT industry. He specializes in performing information security assessments revolving around compliance and IT governance.
目录
Foreword.
Introduction.
Part Ⅰ: Building the Foundation for Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Cracking the Hacker Mindset.
Chapter 3: Developing Your Ethical Hacking Plan.
Chapter 4: Hacking Methodology.
Part Ⅱ: Putting Ethical Hacking in Motion.
Chapter 5: Social Engineering..
Chapter 6: Physical Security.
Chapter 7: Passwords.
Part Ⅲ: Hacking the Network.
Chapter 8: War Dialing.
Chapter 9: Network Infrastructure.
Chapter 10: Wireless LANs.
Part Ⅳ: Hacking Operating Systems.
Chapter 11: Windows.
Chapter 12: Linux.
Chapter 13: Novell NetWare.
Part Ⅴ: Hacking Applications.
Chapter 14: Messaging Systems.
Chapter 15: Web Applications.
Part Ⅵ: Ethical Hacking Aftermath.
Chapter 16: Reporting Your Results.
Chapter 17: Plugging Security Holes.
Chapter 18: Managing Security Changes.
Part Ⅶ: The Part of Tens.
Chapter 19: Ten Tips for Getting Upper Management Buy-In.
Chapter 20: Ten Deadly Mistakes.
Appendix: Tools and Resources.
Index.