Hacking For Dummies, 2/e
Develop a plan to keep your information safe
Find out how to test your systems, plug the holes, and foil attackers
You'll find out how external hacker and rogue insider hacks happen, how to discover where your systems and network are weak, what you can do to strengthen your defenses, and how to prepare reports and recommendations to management.
Discover how to
- Identify the different types of attacks
- Create a plan for testing
- Recognize vulnerabilities in your network
- Prevent attacks by rogue insiders
- Test applications, files, and databases
- Plug security holes
Table of Contents
Part I: Building the Foundation for Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Cracking the Hacker Mindset.
Chapter 3: Developing Your Ethical Hacking Plan.
Chapter 4: Hacking Methodology.
Part II: Putting Ethical Hacking in Motion.
Chapter 5: Social Engineering..
Chapter 6: Physical Security.
Chapter 7: Passwords.
Part III: Hacking the Network.
Chapter 8: War Dialing.
Chapter 9: Network Infrastructure.
Chapter 10: Wireless LANs.
Part IV: Hacking Operating Systems.
Chapter 11: Windows.
Chapter 12: Linux.
Chapter 13: Novell NetWare.
Part V: Hacking Applications.
Chapter 14: Messaging Systems.
Chapter 15: Web Applications.
Part VI: Ethical Hacking Aftermath.
Chapter 16: Reporting Your Results.
Chapter 17: Plugging Security Holes.
Chapter 18: Managing Security Changes.
Part VII: The Part of Tens.
Chapter 19: Ten Tips for Getting Upper Management Buy-In.
Chapter 20: Ten Deadly Mistakes.
Appendix: Tools and Resources.