01369nam 2200397 450 99627985220331620230803194710.01-4799-5944-8(CKB)2560000000337715(WaSeSS)IndRDA00119956(EXLCZ)99256000000033771520200312d2014 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrier2014 International Conference on Reconfigurable Computing and FPGAs (ReConFig14) Cancun, Mexico, December 8-10, 2014 /editors Michael Huebner, Mike Wirthlin, René CumplidoPiscataway, New Jersey :Institute of Electrical and Electronics Engineers,2014.1 online resource (372 pages)1-4799-5945-6 1-4799-5943-X Computer architectureCongressesAdaptive computing systemsCongressesComputer architectureAdaptive computing systems004.22Huebner MichaelWirthlin MikeCumplido RenéWaSeSSWaSeSSPROCEEDING9962798522033162014 International Conference on Reconfigurable Computing and FPGAs (ReConFig14)2524355UNISA05577nam 2200697Ia 450 991081317080332120230721030550.01-280-97384-697866109738420-470-23138-6(CKB)1000000000400391(EBL)315200(OCoLC)630529467(SSID)ssj0000291085(PQKBManifestationID)11230502(PQKBTitleCode)TC0000291085(PQKBWorkID)10248466(PQKB)10050803(MiAaPQ)EBC315200(Au-PeEL)EBL315200(CaPaEBR)ebr10296353(CaONFJC)MIL97384(EXLCZ)99100000000040039120070813d2007 uy 0engur|n|---|||||txtccrThe CEH prep guide[electronic resource] the comprehensive guide to certified ethical hacking /Ronald L. Krutz, Russell Dean VinesIndianapolis, IN Wileyc20071 online resource (770 p.)Includes index.0-470-13592-1 The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment QuestionsChapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment QuestionsChapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session HijackingAssessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment QuestionsPart IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless SecurityDisk EncryptionThe Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scopePresents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and moreDiscusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hackingContains a CD-ROM that enables readComputer securityTestingExaminationsStudy guidesComputer networksSecurity measuresExaminationsStudy guidesComputer networksExaminationsStudy guidesComputer hackersComputer securityTestingExaminationsComputer networksSecurity measuresExaminationsComputer networksExaminationsComputer hackers.004.16005.854.89bclKrutz Ronald L.1938-543581Vines Russell Dean1952-1114690MiAaPQMiAaPQMiAaPQBOOK9910813170803321The CEH prep guide3983501UNINA