Results 1 to 2 of 2

Thread: Hacking For Dummies

  1. #1
    Junior Member
    Join Date
    Dec 2006
    Posts
    5




    While you’re reading this, a hacker could be prying and spying his way into your company’s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker’s mindset and take security precautions to help you avoid a hack attack. It outlines computer hacker tricks and techniques you can use to assess the security of your own information systems, find security vulnerabilities, and fix them before malicious and criminal hackers can exploit them.

    Contents at a Glance
    Foreword...................................................................xvii
    Introduction .................................................................1
    Part I: Building the Foundation for Ethical Hacking .......7
    Chapter 1: Introduction to Ethical Hacking ...................................................................9
    Chapter 2: Cracking the Hacker Mindset ......................................................................21
    Chapter 3: Developing Your Ethical Hacking Plan .......................................................29
    Chapter 4: Hacking Methodology ..................................................................................39
    Part II: Putting Ethical Hacking in Motion ..................53
    Chapter 5: Social Engineering ........................................................................................55
    Chapter 6: Physical Security ..........................................................................................69
    Chapter 7: Passwords ...79
    Part III: Network Hacking ........................................103
    Chapter 8: War Dialing ..................................................................................................105
    Chapter 9: Network Infrastructure ..............................................................................117
    Chapter 10: Wireless LANs ...........................................................................................147
    Part IV: Operating System Hacking ..........................165
    Chapter 11: Windows ...167
    Chapter 12: Linux ...193
    Chapter 13: Novell NetWare .........................................................................................215
    Part V: Application Hacking .....................................235
    Chapter 14: Malware ...237
    Chapter 15: Messaging Systems ..................................................................................257
    Chapter 16: Web Applications .....................................................................................279
    Part VI: Ethical Hacking Aftermath ..........................297
    Chapter 17: Reporting Your Results ............................................................................299
    Chapter 18: Plugging Security Holes ...........................................................................305
    Chapter 19: Managing Security Changes ....................................................................311
    Part VII: The Part of Tens .........................................317
    Chapter 20: Ten Tips for Getting Upper Management Buy-In ..................................319
    Chapter 21: Ten Deadly Mistakes ................................................................................323
    Part VIII: Appendixes ...............................................327
    Appendix A: Tools and Resources................................................................................329
    Appendix B: About the Book Web Site.........................................................................337
    Index .......................................................................339

    **Hidden Content: To see this hidden content your post count must be 5 or greater.**

  2. #2
    Administrator asylu3's Avatar
    Join Date
    Jun 2000
    Location
    Thailand
    Posts
    3,557


    **Hidden Content: To see this hidden content your post count must be 10 or greater.**

Similar Threads

  1. Replies: 0
    Last Post: 24-09-2007, 07:36 AM
  2. Replies: 0
    Last Post: 11-09-2007, 12:44 PM
  3. Replies: 0
    Last Post: 09-09-2007, 01:32 AM
  4. Replies: 0
    Last Post: 05-01-2006, 10:35 PM
  5. Hacking for Dummies
    By newsbot in forum World Hacking Ebook
    Replies: 0
    Last Post: 05-01-2006, 10:35 PM

Members who have read this thread : 0

Actions : (View-Readers)

There are no names to display.

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •