For You

How to Use This Book

This book includes the following features:
 Various technical and nontechnical hack attacks and their detailed
methodologies
 Hack-attack case studies from well-known and anonymous hackers and
other security experts
 Specific countermeasures to protect against hack attacks
Each chapter is an individual reference on a specific ethical hacking subject.
You can refer to individual chapters that pertain to the type of systems you're
assessing, or you can read the book straight through.
2 Hacking For Dummies
Before you start hacking your systems, familiarize yourself with the information
in Part I so you're prepared for the tasks at hand. The adage "if you fail
to plan, you plan to fail" rings true for the ethical hacking process. You must
get written permission and have a solid game plan.
This material is not intended to be used for unethical or illegal hacking purposes
to propel you from script kiddie to mega hacker. Rather, it is designed
to provide you with the knowledge you need to hack your own or your customers'
systems — in an ethical and legal manner — to enhance the security
of the information involved.

No comments:

Post a Comment