"Ethical hacking" is the process of entering into a hacker's mindset in order to spot system vulnerabilities by performing typical hacks in a controlled environment. This book helps security professionals understand how malicious users think
and work, enabling administrators to defend their systems against attacks and to identify security vulnerabilities.
* Shows readers how to approach their system security
from the hacker's perspective and perform nondestructive
penetration testing
* Helps the reader develop an ethical hacking plan, and
examines typical attacks and how to counteract them
* Guides readers through reporting vulnerabilities to upper
management, managing security changes, automating the
ethical hacking process, and training end-users to avoid
being victimized
Author Biography: Kevin Beaver is a consultant who specializes in security assessments and incident response.
He is a regular columnist and expert advisor for SearchSecurity.com and SearchMobileComputing.com.
Part I Building the foundation for ethical hacking
Part II Putting ethical hacking in motion
Part III Network hacking
Part IV Operating system hacking
Part V Application hacking
Part VI Ethical hacking aftermath
Part VII The part of tens
Part VIII Appendixes
Appendix A: Tools and resources
Appendix B: About the book web site