Vai al contenuto principale della pagina
Autore: | Graves Kimberly <1974-> |
Titolo: | CEH : certified ethical hacker study guide / / Kimberly Graves |
Pubblicazione: | Indianapolis, IN, : Wiley, 2010 |
Edizione: | 1st ed. |
Descrizione fisica: | 1 online resource (439 p.) |
Disciplina: | 005.8 |
Soggetto topico: | Electronic data processing personnel - Certification |
Computer security - Examinations | |
Computer hackers - Examinations | |
Computer networks - Examinations | |
Note generali: | Description based upon print version of record. |
Nota di bibliografia: | Includes bibliographical references and index. |
Nota di contenuto: | CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms |
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary | |
Index | |
Sommario/riassunto: | Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial |
Titolo autorizzato: | CEH |
ISBN: | 1-282-68350-0 |
9786612683503 | |
0-470-64286-6 | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910807023703321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |