- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Think like a hacker to protect your sensitive information
To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data. You won't learn how to steal your neighbors' Wi-Fi, but you will gain the skills to keep nosy hackers out of your systems and applications. With clear, jargon-free explanations, you'll learn to recognize cyberthreats and keep your information safe. This updated edition includes new content on AI, the Internet of Things (IoT), and the security implications of hybrid work.
Understand the tools hackers use to steal sensitive data from individuals and businesses
Discover methods of protecting your information—including improving your security, recognizing phishing scams, and more
Assess your current network and cloud configurations from a hacker's perspective using proven vulnerability and penetration testing techniques
Defend against AI-generated scams, lost devices, and other common threats
Hacking For Dummies is for anyone looking to protect their devices from hacking—at home, at the office, or anywhere in-between.
Contents
Introduction 1
Part 1: Building the Foundation for Security Testing 5
Chapter 1: Introduction to Vulnerability and Penetration Testing 7
Chapter 2: Cracking the Hacker Mindset 27
Chapter 3: Developing Your Security Testing Plan 41
Chapter 4: Hacking Methodology 55
Part 2: Putting Security Testing in Motion 67
Chapter 5: Information Gathering 69
Chapter 6: Social Engineering 79
Chapter 7: Physical Security 97
Chapter 8: Passwords 109
Part 3: Hacking Network Hosts 141
Chapter 9: Network Infrastructure Systems 143
Chapter 10: Wireless Networks 175
Chapter 11: Mobile Devices 203
Part 4: Hacking Operating Systems 217
Chapter 12: Windows 219
Chapter 13: Linux and macOS 247
Part 5: Hacking Applications 271
Chapter 14: Email Systems 273
Chapter 15: Web Applications and Mobile Apps 293
Chapter 16: Databases and Storage Systems 321
Part 6: Security Testing Aftermath 233
Chapter 17: Reporting Your Results 335
Chapter 18: Plugging Your Security Holes 343
Chapter 19: Managing Security Processes 351
Part 7: The Part of Tens 259
Chapter 20: Ten Tips for Getting Security Buy-In 361
Chapter 21: Ten Reasons Hacking Is the Only Effective Way to Test 367
Chapter 22: Ten Deadly Mistakes. 371
Index 377