Text
Hacking for dummies
Table of contents:
Introduction
Part 1 : Building the foundation for security testing
Chppter 1: Introduction to vulnerability and penetration testing
Chapter 2: Cracking the hacker mindset
Chapter 3: Developing your security testing plan
Chapter 4: Haking methodology
Part 2 : Putting security testing in motion
Chapter 5: Information gathering
Chapter 6: Social engineering
Chapter 7: Physical security
Chapter 8: Passwords
Part 3 : Hacking network hosts
Chapter 9: Network infrastructure systems
Chapter 10: Wireless network
Chapter 11: Mobile devices
Part 4 : Hacking operating systems
Chapter 12: Windows
Chapter 13: linux and macOS
Part 5 : Hacking applications
Chapter 14: Communication and messaging systems
Chapter 15: Web applications and mobile apps
Chapter 16: Database and storage systems
Part 6 : Security testing aftermath
Chapter 17: Reporting your results
Chapter 18: Plugging your security holes
Chapter 19: Managing security processes
No other version available