Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Kevin Beaver
Hacking For Dummies
Читать книгу Hacking For Dummies - Kevin Beaver - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
74
Оглавление
Купить и скачать книгу
Вернуться на страницу книги Hacking For Dummies
Оглавление
Страница 1
Страница 2
Hacking For Dummies® To view this book's Cheat Sheet, simply go to
www.dummies.com
and search for “Hacking For Dummies Cheat Sheet” in the Search box. Table of Contents
List of Tables
List of Illustrations
Guide
Pages
Страница 8
Страница 9
Страница 10
Introduction to Vulnerability and Penetration Testing
Straightening Out the Terminology
Hacker
Malicious user
Recognizing How Malicious Attackers Beget Ethical Hackers
SECURITY TESTING CERTIFICATIONS
Vulnerability and penetration testing versus auditing
Policy considerations
Compliance and regulatory concerns
Understanding the Need to Hack Your Own Systems
Understanding the Dangers Your Systems Face
Nontechnical attacks
Network infrastructure attacks
Operating system attacks
Application and other specialized attacks
Following the Security Assessment Principles
Working ethically
Respecting privacy
Not crashing your systems
Using the Vulnerability and Penetration Testing Process
Formulating your plan
Selecting tools
Executing the plan
Evaluating results
Moving on
Страница 36
Cracking the Hacker Mindset
What You’re Up Against
THINKING LIKE THE BAD GUYS
Who Breaks into Computer Systems
Hacker skill levels
Hacker motivations
Why They Do It
HACKING IN THE NAME OF LIBERTY?
Planning and Performing Attacks
HACKING MAGAZINES
Maintaining Anonymity
Страница 48
Developing Your Security Testing Plan
Establishing Your Goals
DO YOU NEED INSURANCE?
Determining Which Systems to Test
ATTACK-TREE ANALYSIS
Creating Testing Standards
Timing your tests
Running specific tests
A CASE STUDY IN SELF-INFLICTED DENIAL OF SERVICE
Conducting blind versus knowledge assessments
Picking your location
Responding to vulnerabilities you find
Making silly assumptions
Selecting Security Assessment Tools
Страница 63
Hacking Methodology
Setting the Stage for Testing
Seeing What Others See
Scanning Systems
Hosts
Open ports
Determining What’s Running on Open Ports
Assessing Vulnerabilities
Penetrating the System
Страница 73
{buyButton}
Подняться наверх