| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910971594803321 |
|
|
Autore |
Graves Kimberly <1974-> |
|
|
Titolo |
CEH : certified ethical hacker study guide / / Kimberly Graves |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Indianapolis, IN, : Wiley, 2010 |
|
|
|
|
|
|
|
ISBN |
|
1-282-68350-0 |
9786612683503 |
0-470-64286-6 |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (439 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electronic data processing personnel - Certification |
Computer security - Examinations |
Hackers - Examinations |
Computer networks - Examinations |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms |
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary |
Index |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial |
|
|
|
|
|
|
|
| |