Hacking for Dummies

by Kevin Beaver

Published 1 January 2004
Are you worried about external hackers and rogue insiders breaking into your systems? Whether it's social engineering, network infrastructure attacks, or application hacking, security breaches in your systems can devastate your business or personal life. In order to counter these cyber bad guys, you must become a hacker yourself - an ethical hacker. "Hacking for Dummies" shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound.You'll discover how to: work ethically, respect privacy, and save your system from crashing; develop a hacking plan; treat social engineers and preserve their honesty; counter war dialing and scan infrastructures; understand the vulnerabilities of Windows, Linux, and Novell NetWare; prevent breaches in messaging systems, web applications, and databases; report your results and managing security changes; avoid deadly mistakes; get management involved with defending your systems.
As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With "Hacking For Dummies", you can strengthen your defenses and prevent attacks from every angle!

Become a cyber-hero - know the common wireless weaknesses

"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional."
--Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program

Wireless networks are so convenient - not only for you, but also for those nefarious types who'd like to invade them. The only way to know if your system can be penetrated is to simulate an attack. This book shows you how, along with how to strengthen any weak spots you find in your network's armor.

Discover how to:

  • Perform ethical hacks without compromising a system
  • Combat denial of service and WEP attacks
  • Understand how invaders think
  • Recognize the effects of different hacks
  • Protect against war drivers and rogue devices