Hacking For Dummies
About this book
Think like a hacker to protect your sensitive information
To safeguard your private data from prying eyes, it helps to understand how hackers do what they do. Hacking For Dummies gives you the tools you need to step into a hacker's shoes and discover the best strategies to secure your data. You won't learn how to steal your neighbors' Wi-Fi, but you will gain the skills to keep nosy hackers out of your systems and applications. With clear, jargon-free explanations, you'll learn to recognize cyberthreats and keep your information safe. This updated edition includes new content on AI, the Internet of Things (IoT), and the security implications of hybrid work.
- Understand the tools hackers use to steal sensitive data from individuals and businesses
- Discover methods of protecting your information—including improving your security, recognizing phishing scams, and more
- Assess your current network and cloud configurations from a hacker's perspective using proven vulnerability and penetration testing techniques
- Defend against AI-generated scams, lost devices, and other common threats
Hacking For Dummies is for anyone looking to protect their devices from hacking—at home, at the office, or anywhere in-between.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Title Page
- Copyright Page
- Table of Contents
- Introduction
- Part 1 Building the Foundation for Security Testing
- Part 2 Putting Security Testing in Motion
- Part 3 Hacking Network Hosts
- Part 4 Hacking Operating Systems
- Part 5 Hacking Applications
- Part 6 Security Testing Aftermath
- Part 7 The Part of Tens
- Index
- EULA
