Hacking / by Kevin Beaver, CISSP.
Record details
- ISBN: 9781119872191
- ISBN: 1119872197
- Physical Description: xii, 396 pages : illustrations ; 24 cm.
- Edition: Seventh edition.
- Publisher: Hoboken, NJ : John Wiley & Sons, Inc., [2022]
- Copyright: ©2022
Content descriptions
General Note: | Previous edition: 2018. |
Bibliography, etc. Note: | Includes index. |
Formatted Contents Note: | pt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources. |
Search for related items by subject
Subject: | Computer security. Computer networks > Security measures. Hackers. |
Search for related items by series
Available copies
- 1 of 1 copy available at Missouri Evergreen. (Show)
- 1 of 1 copy available at Cass County.
Holds
- 0 current holds with 1 total copy.
Show Only Available Copies
Location | Call Number / Copy Notes | Barcode | Shelving Location | Status | Due Date |
---|---|---|---|---|---|
Cass County Library-Northern Resource Center | 005.8 BEA 2022 (Text) | 0002205507961 | Adult Non-Fiction | Available | - |
LDR | 02020cam a2200373 i 4500 | ||
---|---|---|---|
001 | 4439743 | ||
003 | ME | ||
008 | 210927t20222022njua b 001 0 eng d | ||
020 | . | ‡a9781119872191 ‡q(paperback) | |
020 | . | ‡a1119872197 ‡q(paperback) | |
035 | . | ‡a(OCoLC)1309496029 | |
040 | . | ‡aAU@ ‡beng ‡erda ‡cAU@ ‡dSFR ‡dNYP ‡dOCLCO | |
049 | . | ‡aMQTA | |
082 | 0 | 4. | ‡a005.8 ‡223 |
100 | 1 | . | ‡aBeaver, Kevin M., ‡eauthor. ‡0(ME)200397 |
245 | 1 | 0. | ‡aHacking / ‡cby Kevin Beaver, CISSP. |
246 | 3 | . | ‡aHacking for dummies |
250 | . | ‡aSeventh edition. | |
264 | 1. | ‡aHoboken, NJ : ‡bJohn Wiley & Sons, Inc., ‡c[2022] | |
264 | 4. | ‡c©2022 | |
300 | . | ‡axii, 396 pages : ‡billustrations ; ‡c24 cm. | |
336 | . | ‡atext ‡btxt ‡2rdacontent | |
337 | . | ‡aunmediated ‡bn ‡2rdamedia | |
338 | . | ‡avolume ‡bnc ‡2rdacarrier | |
490 | 1 | . | ‡a--For dummies |
500 | . | ‡aPrevious edition: 2018. | |
504 | . | ‡aIncludes index. | |
505 | 0 | . | ‡apt. I. Building the foundation for security testing. Introduction to vulnerability and penetration testing ; Cracking the hacker mindset ; Developing your security testing plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux and macOS -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging your security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources. |
650 | 0. | ‡aComputer security. ‡0(ME)515184 | |
650 | 0. | ‡aComputer networks ‡xSecurity measures. ‡0(ME)25756 | |
650 | 0. | ‡aHackers. ‡0(ME)282025 | |
830 | 0. | ‡a--For dummies. ‡0(ME)7784 | |
904 | . | ‡aMARCIVE 2022 | |
901 | . | ‡a4439743 ‡bAUTOGEN ‡c4439743 ‡tbiblio |