BOOK DESCRIPTION
It's bad enough when a hack occurs-stealing identities, bank accounts, and personal information. But when the hack could have been prevented by taking basic security measures-like the ones described in this book-somehow that makes a bad situation even worse. This beginner guide to hacking examines some of the best security measures that exist and has been updated to cover the latest hacks for Windows 7 and the newest version of Linux.
Offering increased coverage of Web application hacks, database hacks, VoIP hacks, and mobile computing hacks, this guide addresses a wide range of vulnerabilities and how to identify and prevent them. Plus, you'll examine why ethical hacking is oftentimes the only way to find security flaws, which can then prevent any future malicious attacks.
Explores the malicious hackers's mindset so that you can counteract or avoid attacks completely
Covers developing strategies for reporting vulnerabilities, managing security changes, and putting anti-hacking policies and procedures in place
Completely updated to examine the latest hacks to Windows 7 and the newest version of Linux
Explains ethical hacking and why it is essential
Hacking For Dummies, 3rd Edition shows you how to put all the necessary security measures in place so that you avoid becoming a victim of malicious hacking.
TABLE OF CONTENTS
Foreword.
Introduction.
Part I: Building the Foundation for Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Cracking the Hacker Mindset.
Chapter 3: Developing Your Ethical Hacking Plan.
Chapter 4: Hacking Methodology.
Part II: Putting Ethical Hacking in Motion.
Chapter 5: Social Engineering.
Chapter 6: Physical Security.
Chapter 7: Passwords.
Part III: Hacking the Network.
Chapter 8: Network Infrastructure.
Chapter 9: Wireless LANs.
Part IV: Hacking Operating Systems.
Chapter 10: Windows.
Chapter 11: Linux.
Chapter 12: Novell NetWare.
Part V: Hacking Applications.
Chapter 13: Communication and Messaging Systems.
Chapter 14: Web Sites and Applications.
Chapter 15: Databases and Storage Systems.
Part VI: Ethical Hacking Aftermath.
Chapter 16: Reporting Your Results.
Chapter 17: Plugging Security Holes.
Chapter 18: Managing Security Changes.
Part VII: The Part of Tens.
Chapter 19: Ten Tips for Getting Upper Management Buy-In.
Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test.
Chapter 21: Ten Deadly Mistakes.
Appendix: Tools and Resources.
Index.
ABOUT THE AUTHOR
Kevin Beaver is an independent information security consultant, expert witness, and speaker with more than 20 years of security experience. He specializes in performing information security assessments that support compliance and risk management.

