Part VII. The Part of Tens

The Part of Tens

In this part . . .

Well, here's the end of the road, so to speak. In this part, I've compiled into top-ten lists what I believe are the absolute critical success factors to make ethical hacking — and information security in general — work in any organization. Bookmark, dog-ear, or do whatever you need to do with these pages so you can refer to them over and over again. This is the meat of what you need to know about information security, compliance, and managing information risks — even more so than the technical hacks and countermeasures I've covered thus far. Read it, study it, and make it happen. You can do it!

In addition, the Appendix contains a listing of my favorite ethical hacking tools and resources that I've covered, broken down into various categories for easy reference.

Get Hacking For Dummies® 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.