Part V

Hacking Applications

9781118380956-pp0501.eps

In this part . . .

Well, this book has covered everything from nontechnical hacks to network and mobile hacks to operating system hacks. What I haven’t yet covered are the applications that run on top of all this, database servers, and the storage systems that ensure the data is available when we need it.

The first chapter in this part covers various messaging hacks and countermeasures affecting e-mail and Voice over IP (VoIP) systems. Next, this part looks at web exploits, along with some countermeasures to secure websites and applications from the elements. Finally, this part covers attacks against database servers and storage systems. It covers both structured data found in various database systems and unstructured data, otherwise known as network files.

Get Hacking For Dummies, 4th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.