Part V

Hacking Applications

image

webextra Read even more great Dummies content at www.dummies.com/extras/hacking.

In this part …

Well, this book has covered all the essential security tests from the nontechnical to the network and on to mobile devices and operating systems. What I haven’t yet covered are the applications that run on top of all this as well as database servers and storage systems that ensure the data is available when we need it.

The first chapter in this part covers various messaging system hacks and countermeasures for e-mail and Voice over IP (VoIP) systems. Next, this part looks at web exploits, along with some countermeasures to secure websites and applications from the elements. Finally, this part covers attacks against database servers and storage systems. It covers both structured data found in various database systems and unstructured data, otherwise known as files scattered across the network waiting to be exploited.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.227.183.153