Defend against the latest Windows® 8 and Linux® hacks
Develop an effective ethical hacking plan
Protect web applications, databases, laptops, and smartphones
Use the latest testing tools and techniques
Are you a defender of systems?
Then you need this book!
Learn how to ward off attacks
Until you can think like a bad guy and recognize the vulnerabilities in your systems, you can't build an effective plan to keep your information secure. This book helps you stay on top of the security game! Here's just what you need to know about penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking.
How a hacker thinks — explore the malicious mindset and learn what steps to take as you plan your ethical hacking program
Recognize common tricks — learn about social engineering, password-cracking techniques, and physical security issues
Get rolling — choose the right tools and set your plan in motion
Demystify mobile security — learn to protect smartphones, laptops, and tablets used in your organization
Protect the network — discover weaknesses in TCP/IP and wireless networks and learn to secure them
Lock your Windows — fortify your Windows and Linux operating systems against attack
App attack — find the vulnerabilities in business applications such as e-mail, web apps, and databases
Use what you learn — correct the flaws you find and keep looking for more
Open the book and find:
Fundamentals of ethical hacking
The weak links in most security programs
Countermeasures to network vulnerabilities
Help establishing an ongoing program
How to develop reports on the information you gather