Hacking for Dummies

Hacking for Dummies

Book - 2013 | 4th ed
Average Rating:
Rate this:

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques.

More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.

Guides you through the techniques and tools you need to stop hackers before they hack you Completely updated to examine the latest hacks to Windows 8 and the newest version of Linux Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely Suggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in place

If you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition .

Publisher: Hoboken, NJ : John Wiley & Sons, Inc., c2013
Edition: 4th ed
ISBN: 9781118380932
Branch Call Number: 658.152018 B386h2 2013
Characteristics: xvi, 390 pages : illustrations ; 24 cm


From the critics

Community Activity


Add a Comment

Nov 09, 2015

If you want an introduction to hacking, it is a good pick.

Reuben Samuels
Jul 29, 2015

Can't wait til this book is ready for pick-up! :D

Mar 27, 2015

Yen Yet who is many security with out the charges I don't think its possible for any OTC to gain from piss of cheat Pete's to valley of cheep by the dozen all the to rack and stack pimp promos theirs is no based solely on
security measures, such as the patching rep what we sow or software
or the detection visuals reality kind of like trill ride always the same thing flipping a game in the begging and end the pretend attacks with gear on no that have already occurred,
instead of expedition measures that pre mode attacks in
the first place. Most of the network security configurations
are performed manually and require experts
to monitor, tune security devices, and recover from
attacks. On the other hand, attacks are getting more
sophisticated and highly automated, which gives the
attackers an advantage in this technology race.
A key contribution of this book is that it provides
an integrated view and a comprehensive framework


Add Age Suitability

There are no ages for this title yet.


Add a Summary

There are no summaries for this title yet.


Add Notices

There are no notices for this title yet.


Add a Quote

There are no quotes for this title yet.

Explore Further

Browse by Call Number


Subject Headings


Find it at PLYMC

To Top