Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Think like a hacker to protect your sensitive information To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data. You won't learn how to steal your neighbors' Wi-Fi, but you will gain the skills to keep nosy hackers out of your systems and applications. With clear, jargon-free explanations, you'll learn to recognize cyberthreats and keep your information safe. This updated edition includes new content on AI, the…mehr
Think like a hacker to protect your sensitive information
To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data. You won't learn how to steal your neighbors' Wi-Fi, but you will gain the skills to keep nosy hackers out of your systems and applications. With clear, jargon-free explanations, you'll learn to recognize cyberthreats and keep your information safe. This updated edition includes new content on AI, the Internet of Things (IoT), and the security implications of hybrid work.
Understand the tools hackers use to steal sensitive data from individuals and businesses
Discover methods of protecting your information-including improving your security, recognizing phishing scams, and more
Assess your current network and cloud configurations from a hacker's perspective using proven vulnerability and penetration testing techniques
Defend against AI-generated scams, lost devices, and other common threats
Hacking For Dummies is for anyone looking to protect their devices from hacking-at home, at the office, or anywhere in-between.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in D ausgeliefert werden.
Die Herstellerinformationen sind derzeit nicht verfügbar.
Autorenporträt
Kevin Beaver is an information security consultant, writer, and professional speaker with nearly four decades of experience in information technology. He's the founder of Principle Logic, LLC, an independent information security company that focuses on vulnerability and penetration testing, security operations reviews, and virtual CISO consulting services.
Inhaltsangabe
Introduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 27 Chapter 3: Developing Your Security Testing Plan 41 Chapter 4: Hacking Methodology 55 Part 2: Putting Security Testing in Motion 67 Chapter 5: Information Gathering 69 Chapter 6: Social Engineering 79 Chapter 7: Physical Security 97 Chapter 8: Passwords 109 Part 3: Hacking Network Hosts 141 Chapter 9: Network Infrastructure Systems 143 Chapter 10: Wireless Networks 175 Chapter 11: Mobile Devices 203 Part 4: Hacking Operating Systems 217 Chapter 12: Windows 219 Chapter 13: Linux and macOS 247 Part 5: Hacking Applications 271 Chapter 14: Email Systems 273 Chapter 15: Web Applications and Mobile Apps 293 Chapter 16: Databases and Storage Systems 321 Part 6: Security Testing Aftermath 233 Chapter 17: Reporting Your Results 335 Chapter 18: Plugging Your Security Holes 343 Chapter 19: Managing Security Processes 351 Part 7: The Part of Tens 259 Chapter 20: Ten Tips for Getting Security Buy-In 361 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 367 Chapter 22: Ten Deadly Mistakes. 371 Index 377
Introduction 1 Part 1: Building the Foundation for Security Testing 5 Chapter 1: Introduction to Vulnerability and Penetration Testing 7 Chapter 2: Cracking the Hacker Mindset 27 Chapter 3: Developing Your Security Testing Plan 41 Chapter 4: Hacking Methodology 55 Part 2: Putting Security Testing in Motion 67 Chapter 5: Information Gathering 69 Chapter 6: Social Engineering 79 Chapter 7: Physical Security 97 Chapter 8: Passwords 109 Part 3: Hacking Network Hosts 141 Chapter 9: Network Infrastructure Systems 143 Chapter 10: Wireless Networks 175 Chapter 11: Mobile Devices 203 Part 4: Hacking Operating Systems 217 Chapter 12: Windows 219 Chapter 13: Linux and macOS 247 Part 5: Hacking Applications 271 Chapter 14: Email Systems 273 Chapter 15: Web Applications and Mobile Apps 293 Chapter 16: Databases and Storage Systems 321 Part 6: Security Testing Aftermath 233 Chapter 17: Reporting Your Results 335 Chapter 18: Plugging Your Security Holes 343 Chapter 19: Managing Security Processes 351 Part 7: The Part of Tens 259 Chapter 20: Ten Tips for Getting Security Buy-In 361 Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 367 Chapter 22: Ten Deadly Mistakes. 371 Index 377
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826