WorldCat Linked Data Explorer

http://worldcat.org/entity/work/id/948172

Hacking for dummies, 2nd edition

Updated for Windows 8 and the latest version of LinuxThe best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.Guides you through the techniques and tools you need to stop hackers before they hack youCompletely updated to examine the latest hacks to Windows 8 and the newest version of LinuxExplores the malicious hackers's mindset so that you can counteract or avoid attacks completelySuggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in placeIf you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition.

Open All Close All

http://schema.org/about

http://schema.org/alternateName

  • "Hacking for dummies"
  • "Hacking for dummies"@it

http://schema.org/description

  • "Updated for Windows 8 and the latest version of LinuxThe best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than ever, this must-have book covers the very latest threats, including web app hacks, database hacks, VoIP hacks, and hacking of mobile devices.Guides you through the techniques and tools you need to stop hackers before they hack youCompletely updated to examine the latest hacks to Windows 8 and the newest version of LinuxExplores the malicious hackers's mindset so that you can counteract or avoid attacks completelySuggests ways to report vulnerabilities to upper management, manage security changes, and put anti-hacking policies and procedures in placeIf you're responsible for security or penetration testing in your organization, or want to beef up your current system through ethical hacking, make sure you get Hacking For Dummies, 4th Edition."@en
  • "Shows network administrators and security testers how to enter the mindset of a malicious hacker and perform penetration testing on their own networks Thoroughly updated with more than 30 percent new content, including coverage of Windows XP SP2 and Vista, a rundown of new security threats, expanded discussions of rootkits and denial of service (DoS) exploits, new chapters on file and database vulnerabilities and Google hacks, and guidance on new hacker tools such as Metaspoilt Topics covered include developing an ethical hacking plan, counteracting typical hack attacks, reporting vulnerabili."@en
  • "Der einzige Weg, den eigenen Computer vor Hack-Angriffen zu schützen, ist zu wissen, wie Hacker arbeiten. Betrachten Sie Ihren Computer oder Ihr Computersystem vom Standpunkt eines Hackers und lernen Sie, wie Sie sich vor Angriffen schützen können. Sie werden verstehen lernen, wie Hacker Passwörter knacken, wie Netzwerke funktionieren und welche Schwachstellen sie haben, wie die Betriebssysteme Windows, Linux und NetWare angreifbar sind und wie Datenbanken ausspioniert werden können. Der Autor zeigt Ihnen, wie Sie Ihre Systeme auf Schwachstellen überprüfen und Sicherheitslücken ausbessern könn."
  • "A guide to computer hacking covers such topics as hacking methodology, social engineering, computer security, passwords, war dialing, wireless LANs, and messaging systems."@en
  • "A guide to computer hacking covers such topics as hacking methodology, social engineering, computer security, passwords, war dialing, wireless LANs, and messaging systems."
  • ""Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.* Shows readers how to approach their system security from the hacker's perspective and perform nondestructive penetration testing* Helps the reader develop an ethical hacking plan, and examines typical attacks and how to counteract them* Guid."@en
  • "Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!"
  • "Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!"@en
  • ""This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux. Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks. Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking"--Resource description p."@en

http://schema.org/genre

  • "Electronic books"@en
  • "Electronic books"
  • "Livres électroniques"
  • "Electronic resource"
  • "[Guides pratiques et mémentos]"
  • "Online-Publikation"
  • "Anleitung"

http://schema.org/name

  • "Combattre les hackers"
  • "Hacking for dummies, 2nd edition"@en
  • "Hacken fur dummies"@en
  • "Hacking For Dummies"
  • "Hacking for dummies [electronic resource]"@en
  • "Hacken für Dummies : [geben Sie Hacker-Angriffen keine Chance]"
  • "Combattre les chackers pour les nuls"
  • "黑客达人迷 = Hacking for dummies"
  • "Hacking per negati"
  • "Hacking per negati"@it
  • "Hacking for dummies"@en
  • "Hacking for dummies : [perform penetration and other security tests on your own network ; beat the bad guys to it ; find the vulnerabilities in your network now]"
  • "Hacking for dummies"
  • "Hei ke da ren mi = Hacking for dummies"
  • "Hei ke da ren mi"
  • "Hacken für Dummies [auf einen Blick: die aktuellen Hacking-Methoden kennen und verstehen lernen, Windows- und Linux-Systeme auf Sicherheit überprüfen, Schwachstellen von Datenbanken, VoiP-Systemen und Web-Anwendungen aufspüren, die Informationssicherheit verbessern]"
  • "Hacken für Dummies : [geben Sie Hacker-Angriffen kein Chance]"
  • "Combattre les hackers pour les nuls"
  • "Hacken für Dummies : [Die aktuellen Hacking-Methoden kennen und verstehen lernen ; Windows- und Linux-Systeme auf Sicherheit überprüfen ; Schwachstellen von Datenbanken, VoIP-Systemen und Web-Andwendungen aufspüren ; die Informationssicherheit verbessern]"
  • "Hacken für Dummies"
  • "黑客达人迷"
  • "Hacking For Dummies®"

http://schema.org/workExample