HSPLS site
Login
My List - 0
Help
Search
My Account
Databases
HI Newspaper
eBooks/Audiobooks
Learning
PC Reservation
Reading Program
Basic
Advanced
Power
History
Search:
Title Browse
Author Browse
Subject Browse
Best Seller Browse
Music Title Browse
Video/DVD Title Browse
Journal/Newspaper Title Browse
Serial Title Browse
Series Browse (includes Bestseller List)
General Keyword
Title Keyword
Author Keyword
Subject Keyword
Name Keyword
Series Keyword
Score Title Browse
Talking Book Title Browse
Awards Note Browse
Bib No.
Barcode
Refine Search
> You're searching:
HAWAII STATE PUBLIC LIBRARY SYSTEM
Item Information
Holdings
Summary
More Content
More by this author
Beaver, Kevin, author.
Subjects
Computer security.
Computer networks -- Security measures.
Browse Catalog
by author:
Beaver, Kevin, author.
by title:
Hacking for dummies ...
MARC Display
Hacking for dummies / by Kevin Beaver ; foreword by Richard Stiennon.
by
Beaver, Kevin, author.
Hoboken, NJ : John Wiley & Sons, Inc., c2016.
Subjects
Computer security.
Computer networks -- Security measures.
ISBN:
1119154685 (pbk.) :
9781119154686 (pbk.)
Series:
--For dummies.
Description:
xvi, 390 pages : illustrations ; 24 cm.
Edition:
5th edition.
Contents:
pt. I. Building the foundation for security testing. Introducion to ethical hacking ; Cracking the hacker mindset ; Developing your ethical hacking plan ; Hacking methodology -- pt. II. Putting security testing in motion. Information gathering ; Social engineering ; Physical security ; Passwords -- pt. III. Hacking network hosts. Network infrastructure systems ; Wireless networks ; Mobile devices -- pt. IV. Hacking operating systems. Windows ; Linux -- pt. V. Hacking applications. Communication and messaging systems ; Web applications and mobile apps ; Databases and storage systems -- pt. VI. Security testing aftermath. Reporting your results ; Plugging security holes ; Managing security processes -- pt. VII. The part of tens. Ten tips for getting security buy-in ; Ten reasons hacking is the only effective way to test ; Ten deadly mistakes ; Appendix: tools and resources.
Requests:
0
Summary:
Until you can think like a bad guy and recognize the vulnerabilities in your system, you can't build an effective plan to keep your information secure. The book helps you stay on top of the security game!
Copy/Holding information
Location
Collection
Call No.
Copy
Status
Hawaii Kai Public Library
Adult Nonfiction
005.8 Be
Checked In
Add Copy to MyList
Kailua-Kona Public Library
Adult Nonfiction
005.8 Be
Checked In
Add Copy to MyList
Kaimuki Public Library
Adult Nonfiction
005.8 Be
[computer shelf]
Checked In
Add Copy to MyList
Kapolei Public Library
Adult Nonfiction
005.8 Be
2016
Checked In
Add Copy to MyList
Manoa Public Library
Adult Nonfiction
005.8 Be
Checked In
Add Copy to MyList
Horizon Information Portal 3.25_9884
© 2001-2013
SirsiDynix
All rights reserved.