The Resource Hacking For Dummies, (electronic resource)

Hacking For Dummies, (electronic resource)

Label
Hacking For Dummies
Title
Hacking For Dummies
Creator
Subject
Genre
Language
eng
Summary
Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More t
Cataloging source
EBLCP
http://library.link/vocab/creatorName
Beaver, Kevin
Dewey number
005.8
Index
no index present
LC call number
QA76.9.A25 .B42 2012
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/subjectName
  • Computer hackers
  • Computer networks
  • Computer networks
  • Computer security
  • Computer security
  • Computer networks
  • Computer hackers
  • COMPUTERS / Internet / Security
  • COMPUTERS / Networking / Security
  • COMPUTERS / Security / General
Label
Hacking For Dummies, (electronic resource)
Link
http://calgary.lib.overdrive.com/ContentDetails.htm?ID=C9DCD2A3-B05D-41BD-8372-97F18CA263B7
Instantiates
Publication
Note
Checking Physical Security
Contents
  • Hacking For Dummies,4th Edition; Table of Contents; Introduction; Who Should Read This Book?; About This Book; How to Use This Book; What You Don't Need to Read; Foolish Assumptions; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Building the Foundation for Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Obeying the Ethical Hacking Commandments
  • Using the Ethical Hacking ProcessChapter 2: Cracking the Hacker Mindset; What You're Up Against; Who Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Ethical Hacking Plan; Establishing Your Goals; Determining Which Systems to Hack; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System
  • Part II: Putting Ethical Hacking in MotionChapter 5: Social Engineering; Introducing Social Engineering; Starting Your First Social Engineering Tests; Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 6: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 7: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password-Cracking Countermeasures; Securing Operating Systems
  • Part III: Hacking Network HostsChapter 8: Network Infrastructure; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 9: Wireless LANs; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless LANs; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 10: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords; Cracking Phones and Tablets
  • Part IV: Hacking Operating SystemsChapter 11: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information about Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 12: Linux; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information about Your Linux Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the . rhosts and hosts. equiv Files; Assessing the Security of NFS; Checking File Permissions; Finding Buffer Overflow Vulnerabilities
Control code
ocn823722226
Dimensions
unknown
Edition
4th ed.
Extent
1 online resource (411 p.)
Form of item
online
Isbn
9781118380963
Isbn Type
(electronic bk.)
Specific material designation
remote
System control number
(OCoLC)823722226
Label
Hacking For Dummies, (electronic resource)
Link
http://calgary.lib.overdrive.com/ContentDetails.htm?ID=C9DCD2A3-B05D-41BD-8372-97F18CA263B7
Publication
Note
Checking Physical Security
Contents
  • Hacking For Dummies,4th Edition; Table of Contents; Introduction; Who Should Read This Book?; About This Book; How to Use This Book; What You Don't Need to Read; Foolish Assumptions; How This Book Is Organized; Icons Used in This Book; Where to Go from Here; Part I: Building the Foundation for Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Straightening Out the Terminology; Recognizing How Malicious Attackers Beget Ethical Hackers; Understanding the Need to Hack Your Own Systems; Understanding the Dangers Your Systems Face; Obeying the Ethical Hacking Commandments
  • Using the Ethical Hacking ProcessChapter 2: Cracking the Hacker Mindset; What You're Up Against; Who Breaks into Computer Systems; Why They Do It; Planning and Performing Attacks; Maintaining Anonymity; Chapter 3: Developing Your Ethical Hacking Plan; Establishing Your Goals; Determining Which Systems to Hack; Creating Testing Standards; Selecting Security Assessment Tools; Chapter 4: Hacking Methodology; Setting the Stage for Testing; Seeing What Others See; Scanning Systems; Determining What's Running on Open Ports; Assessing Vulnerabilities; Penetrating the System
  • Part II: Putting Ethical Hacking in MotionChapter 5: Social Engineering; Introducing Social Engineering; Starting Your First Social Engineering Tests; Why Attackers Use Social Engineering; Understanding the Implications; Performing Social Engineering Attacks; Social Engineering Countermeasures; Chapter 6: Physical Security; Identifying Basic Physical Security Vulnerabilities; Pinpointing Physical Vulnerabilities in Your Office; Chapter 7: Passwords; Understanding Password Vulnerabilities; Cracking Passwords; General Password-Cracking Countermeasures; Securing Operating Systems
  • Part III: Hacking Network HostsChapter 8: Network Infrastructure; Understanding Network Infrastructure Vulnerabilities; Choosing Tools; Scanning, Poking, and Prodding the Network; Detecting Common Router, Switch, and Firewall Weaknesses; Putting Up General Network Defenses; Chapter 9: Wireless LANs; Understanding the Implications of Wireless Network Vulnerabilities; Choosing Your Tools; Discovering Wireless LANs; Discovering Wireless Network Attacks and Taking Countermeasures; Chapter 10: Mobile Devices; Sizing Up Mobile Vulnerabilities; Cracking Laptop Passwords; Cracking Phones and Tablets
  • Part IV: Hacking Operating SystemsChapter 11: Windows; Introducing Windows Vulnerabilities; Choosing Tools; Gathering Information about Your Windows Vulnerabilities; Detecting Null Sessions; Checking Share Permissions; Exploiting Missing Patches; Running Authenticated Scans; Chapter 12: Linux; Understanding Linux Vulnerabilities; Choosing Tools; Gathering Information about Your Linux Vulnerabilities; Finding Unneeded and Unsecured Services; Securing the . rhosts and hosts. equiv Files; Assessing the Security of NFS; Checking File Permissions; Finding Buffer Overflow Vulnerabilities
Control code
ocn823722226
Dimensions
unknown
Edition
4th ed.
Extent
1 online resource (411 p.)
Form of item
online
Isbn
9781118380963
Isbn Type
(electronic bk.)
Specific material designation
remote
System control number
(OCoLC)823722226

Library Locations

  • Bowness LibraryBorrow it
    6532 Bowness Road NW, Calgary, Alberta, T3B OE9, CA
    51.0889698 -114.2011763
  • Calgary Public Library MobileBorrow it
    CA
  • Central LibraryBorrow it
    616 Macleod Trail SE, Calgary, Alberta, T2G 2M2, CA
    51.046473 -114.057859
  • Country Hills LibraryBorrow it
    11950 Country Village Link NE, Calgary, Alberta, T3K 6E3, CA
    51.160139 -114.0676844
  • Crowfoot LibraryBorrow it
    8665 Nose Hill Drive, Calgary, Alberta, T3G 5T3, CA
    51.129458 -114.193826
  • Fish Creek LibraryBorrow it
    11161 Bonaventure Drive SE, Calgary, Alberta, T2J 6S1, CA
    50.951870 -114.061042
  • Forest Lawn LibraryBorrow it
    4807 8th Avenue SE, Calgary, Alberta, T2A 4M1, CA
    51.0451596 -113.9657157
  • Giuffre Family LibraryBorrow it
    3223 14th Street SW, Calgary, Alberta, T2T 3V8, CA
    51.024526 -114.0947351
  • Glenmore Square LibraryBorrow it
    7740 18th Street SE, Calgary, Alberta, T2C 2N5, CA
    50.9833577 -114.0146572
  • Judith Umbach LibraryBorrow it
    6617 Centre Street North, Calgary, Alberta, T2K 4Y5, CA
    51.1113839 -114.0626328
  • Louise Riley LibraryBorrow it
    1904 14th Avenue NW, Calgary, Alberta, T2N 1M5, CA
    51.0652117 -114.105152
  • Memorial Park LibraryBorrow it
    1221 2nd Street SW, Calgary, Alberta, T2R 0W5, CA
    51.041549 -114.0682554
  • Nose Hill LibraryBorrow it
    1530 Northmount Drive NW, Calgary, Alberta, T2L 0G6, CA
    51.096103 -114.13759
  • Saddletowne LibraryBorrow it
    7556 Falconridge Blvd NE, Calgary, Alberta, T3J 0C9, CA
    51.1212759 -113.9469193
  • Shaganappi LibraryBorrow it
    3415 8th Avenue SW, Calgary, Alberta, T3C 0E8, CA
    51.0448674 -114.1367083
  • Shawnessy LibraryBorrow it
    333 Shawville Blvd. SE, Calgary, Alberta, T2Y 4H3, CA
    50.898545 -114.062885
  • Signal Hill LibraryBorrow it
    5994 Signal Hill Centre SW, Calgary, Alberta, T3H 3P8, CA
    51.0180759 -114.1755888
  • Southwood LibraryBorrow it
    924 Southland Drive SW, Calgary, Alberta, T2W 0J9, CA
    50.963642 -114.0858663
  • Village Square LibraryBorrow it
    2623 56th Street NE, Calgary, Alberta, T1Y 6E7, CA
    51.0755508 -113.9526426