Ebooks

Hacking for Dummies1&2

  • Download 5x Faster
  • Download torrent
  • Direct Download
  • Rate this torrent +  |  -
Hacking for Dummies1&2

Anonymous and Free Direct Download 300GB+


Torrent info

Name:Hacking for Dummies1&2

Total Size: 9.43 MB

Magnet: Magnet Link

Seeds: 0

Leechers: 0

Stream: Watch Online @ Movie4u

Last Updated: 2010-12-04 08:42:55 (Update Now)

Torrent added: 2009-08-20 23:31:46



VPN For Torrents

Torrent Files List


info.txt (Size: 9.43 MB) (Files: 4)

 info.txt

3.64 KB

 readme.txt

4.43 KB

 Hacking for Dummies 2.doc

147.00 KB

 Hacking for Dummies.pdf

9.28 MB
 

Announce URL: http://www.sumotracker.com/announce

Torrent description

Make sure you guys seed after downloading, after three days I won't be seeding unless needed, because these will be removed from my hard drive. Enjoy.



\\\ Hacking For Dummies 1 & 2. (I won't paste any info for Vol2 since you can get the drift from reading info from Vol1)

Contents at a Glance (Vol 1)


Foreword...................................................................xvii
Introduction .................................................................1
Part I: Building the Foundation for Ethical Hacking .......7
Chapter 1: Introduction to Ethical Hacking ...................................................................9
Chapter 2: Cracking the Hacker Mindset ......................................................................21
Chapter 3: Developing Your Ethical Hacking Plan .......................................................29
Chapter 4: Hacking Methodology ..................................................................................39
Part II: Putting Ethical Hacking in Motion ..................53
Chapter 5: Social Engineering ........................................................................................55
Chapter 6: Physical Security ..........................................................................................69
Chapter 7: Passwords .....................................................................................................79
Part III: Network Hacking ........................................103
Chapter 8: War Dialing ..................................................................................................105
Chapter 9: Network Infrastructure ..............................................................................117
Chapter 10: Wireless LANs ...........................................................................................147
Part IV: Operating System Hacking ..........................165
Chapter 11: Windows ....................................................................................................167
Chapter 12: Linux ..........................................................................................................193
Chapter 13: Novell NetWare .........................................................................................215
Part V: Application Hacking .....................................235
Chapter 14: Malware .....................................................................................................237
Chapter 15: Messaging Systems ..................................................................................257
Chapter 16: Web Applications .....................................................................................279
Part VI: Ethical Hacking Aftermath ..........................297
Chapter 17: Reporting Your Results ............................................................................299
Chapter 18: Plugging Security Holes ...........................................................................305
Chapter 19: Managing Security Changes ....................................................................311
Part VII: The Part of Tens .........................................317
Chapter 20: Ten Tips for Getting Upper Management Buy-In ..................................319
Chapter 21: Ten Deadly Mistakes ................................................................................323
Part VIII: Appendixes ...............................................327
Appendix A: Tools and Resources................................................................................329
Appendix B: About the Book Web Site.........................................................................337

related torrents

Torrent name

health leech seeds Size
 


comments (0)

Main Menu