O'Reilly logo

Hacking For Dummies® 3rd Edition by Kevin Beaver

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part V. Hacking Applications

Hacking Applications

In this part . . .

Well, hacks to network hacks to operating system hacks. What I haven't yet covered are the applications that run on top of all of this and the storage systems that keep everything intact.

The first chapter in this part covers various messaging hacks and countermeasures affecting e-mail, instant messaging, and Voice over IP (VoIP) systems. Next, this part looks at Web application exploits, along with some countermeasures to secure them from the elements. It then goes deeper into application hacking using Google and its searching capabilities. Finally, this part covers attacks against storage systems. It covers both unstructured data, otherwise known as network files, and structured data found in various database systems.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required