| 000 | 02678cam a22004457i 4500 | ||
|---|---|---|---|
| 001 | 18845685 | ||
| 003 | SISC | ||
| 005 | 20170110083854.0 | ||
| 008 | 151104s2016 njua 001 0 eng d | ||
| 010 | _a 2015956627 | ||
| 020 | _a1119154685 | ||
| 020 | _a9781119154686 | ||
| 035 | _a(OCoLC)ocn908805314 | ||
| 040 |
_aYDXCP _beng _cYDXCP _erda _dBTCTA _dOCLCQ _dSFR _dCGP _dJQM _dJTH _dDLC |
||
| 042 | _alccopycat | ||
| 050 | 0 | 0 |
_aQA 76.9.A25 _b.B42 2016 |
| 082 | 0 | 4 | _a005.8 |
| 100 | 1 |
_aBeaver, Kevin, _eauthor. |
|
| 245 | 1 | 0 |
_aHacking for dummies / _cby Kevin Beaver ; foreword by Richard Stiennon. |
| 250 | _a5th edition. | ||
| 260 |
_aNJ : _bJohn Wiley & Sons, Inc., _c2016. |
||
| 300 |
_axvi, 390 pages : _billustrations ; _c24 cm. |
||
| 490 | 1 | _a--For dummies | |
| 500 | _aPrevious edition: 2013. | ||
| 500 | _aIncludes and index. | ||
| 505 | 0 | _apt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources. | |
| 520 | _aUntil you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game! | ||
| 650 | 0 | _aComputer security. | |
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 | _aHackers. | |
| 700 | 1 |
_aStiennon, Richard, _d1959- _eauthor of foreword. |
|
| 830 | 0 | _a--For dummies. | |
| 856 | 4 | 2 |
_3Contributor biographical information _uhttps://www.loc.gov/catdir/enhancements/fy1701/2015956627-b.html |
| 856 | 4 | 2 |
_3Publisher description _uhttps://www.loc.gov/catdir/enhancements/fy1701/2015956627-d.html |
| 856 | 4 | 1 |
_3Table of contents only _uhttps://www.loc.gov/catdir/enhancements/fy1701/2015956627-t.html |
| 906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK |
||
| 999 |
_c305379 _d305379 |
||