03735nam 2200661Ia 450 991078116120332120230725045118.01-282-68350-097866126835030-470-64286-6(CKB)2550000000013627(EBL)516952(OCoLC)635955021(SSID)ssj0000404185(PQKBManifestationID)11278728(PQKBTitleCode)TC0000404185(PQKBWorkID)10341131(PQKB)10763189(MiAaPQ)EBC516952(CaSebORM)9780470525203(Au-PeEL)EBL516952(CaPaEBR)ebr10383604(CaONFJC)MIL268350(EXLCZ)99255000000001362720100202d2010 uy 0engur|n|---|||||txtccrCEH[electronic resource] certified ethical hacker study guide /Kimberly Graves1st ed.Indianapolis, IN Wiley20101 online resource (439 p.)Description based upon print version of record.0-470-52520-7 Includes bibliographical references and index.CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and WormsChapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; GlossaryIndexFull Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denialElectronic data processing personnelCertificationComputer securityExaminationsStudy guidesComputer hackersExaminationsStudy guidesComputer networksExaminationsStudy guidesElectronic data processing personnelCertification.Computer securityExaminationsComputer hackersExaminationsComputer networksExaminations005.8Graves Kimberly1974-1471107MiAaPQMiAaPQMiAaPQBOOK9910781161203321CEH3683273UNINA