About this item

Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources. Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system - and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network. Defend your system - and all of the data it holds - against the latest Windows 10 and Linux hacks Develop an effective ethical hacking plan that keeps your system safe Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it - and it will become your go-to reference when ethical hacking is on your to-do list.



About the Author

Kevin Beaver

I am an independent information security consultant, expert witness, author, and professional speaker with over 27 years of experience in IT - the last 21 of which I've dedicated to information security. Before starting Principle Logic in 2001, I served in various information technology and security roles for several healthcare, e-commerce, financial firms, educational institutions, and consulting organizations.

I have appeared on CNN television as an information security expert and have been quoted in the Wall Street Journal, Entrepreneur Magazine, Fortune Small Business, Women's Health and Inc. Magazine's technology site IncTechnology.com. My work has also been referenced by the PCI Council in their Data Security Standard Wireless Guidelines. I have presented at seminars and conferences over 200 times and have been a top-rated information security speaker at shows for Gartner, TechTarget, RSA, CSI, SecureWorld Expo and The IIA. I focus my speaking services on information security seminars, panels and keynoting IT and information security-related shows. Additionally, I've performed over six dozen webcasts for TechTarget, Ziff-Davis and other publishers.

I am author/co-author of 12 information security books including Hacking For Dummies, Hacking Wireless Networks For Dummies, Point-of-Sale Security For Dummies, Securing the Mobile Enterprise For Dummies, and Laptop Encryption For Dummies (all by Wiley) as well as The Definitive Guide to Email Management and Security (Realtimepublishers.com) and The Practical Guide to HIPAA Privacy and Security Compliance (Auerbach) . In addition, I am technical editor of the book Network Security For Dummies (Wiley) as well as over a dozen books and whitepapers for Realtimepublishers.com.

I have written 37 whitepapers and over 850 articles on information security. I am a regular contributor of information security content for SearchSecurity.com, SearchEnterpriseDesktop.com, SearchSoftwareQuality.com, SearchWindowsServer.com, and Toolbox.com. I have also written articles for Information Security Magazine, CSOOnline.com, and Computerworld.com. In addition, I'm the creator and author of the Security On Wheels information security audio programs providing security learning for IT professionals on the go as well as its associated blog here at securityonwheels.com/blog. You can also view my videos on YouTube at www.youtube.com/c/KevinBeaver, follow me on Twitter at www.twitter.com/kevinbeaver and link to me on LinkedIn at www.linkedin.com/in/kevinbeaver.

I earned my bachelor's degree in Computer Engineering Technology from Southern College of Technology and my master's degree in Management of Technology from Georgia Tech. I also hold the Certified Information Systems Security Professional (CISSP) certification which I obtained in 2001.



Read Next Recommendation

Report incorrect product information.