Hacking For Dummies, 4th Edition HD PDF

This article is the original content of AppNee. All rights reserved. To repost or reproduce, please make a footnote with our article link!

To popularize some boring technology, we have to turn to For Dummies or Head First and such as these series of books. Hacking For Dummies, 4th Edition is not only suitable for beginners who are interested in computer system testing evaluation and IT security, but also has great reference value for network administrators, information security manager/consultant/auditor, and other professionals.

Hacking For Dummies, 4th Edition covers the common and key hacking attack methods and tools in detail (within the scope of morality), classic test cases for Windows or Linux OS, intrusion of database, VoIP system and Web applications, bugs report, and information security improvement.

On the basis of clear structure and comprehensive content, the whole book uses a unique angle of view, humorous and vivid language to introduce the entire process of ethical hacking attacks, aiming at helping readers know themselves as well as the enemies and win every network security war (whether it’s attack or defense).

// Table Of Contents //

  • Part I: Building the Foundation for Ethical Hacking 7
    • Chapter 1: Introduction to Ethical Hacking 9
    • Chapter 2: Cracking the Hacker Mindset 25
    • Chapter 3: Developing Your Ethical Hacking Plan 35
    • Chapter 4: Hacking Methodology 47
  • Part II: Putting Ethical Hacking in Motion 63
    • Chapter 5: Social Engineering 65
    • Chapter 6: Physical Security 81
    • Chapter 7: Passwords 93
  • Part III: Hacking Network Hosts 121
    • Chapter 8: Network Infrastructure 123
    • Chapter 9: Wireless LANs 157
    • Chapter 10: Mobile Devices 185
  • Part IV: Hacking Operating Systems 197
    • Chapter 11: Windows 199
    • Chapter 12: Linux 227
  • Part V: Hacking Applications 249
    • Chapter 13: Communication and Messaging Systems 251
    • Chapter 14: Websites and Applications 277
    • Chapter 15: Databases and Storage Systems 305
  • Part VI: Ethical Hacking Aftermath 317
    • Chapter 16: Reporting Your Results 319
    • Chapter 17: Plugging Security Holes 325
    • Chapter 18: Managing Security Processes 331
  • Part VII: The Part of Tens 339
    • Chapter 19: Ten Tips for Getting Upper Management Buy-In 341
    • Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test 347
    • Chapter 21: Ten Deadly Mistakes 351
  • Appendix: Tools and Resources 355

// Download URLs //

 (31.6 MB | Homepage)