CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
| CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves |
| Autore | Graves Kimberly <1974-> |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2010 |
| Descrizione fisica | 1 online resource (439 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer hackers - Examinations Computer networks - Examinations |
| Soggetto genere / forma | Electronic books. |
| ISBN |
1-282-68350-0
9786612683503 0-470-64286-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary Index |
| Record Nr. | UNINA-9910456406203321 |
Graves Kimberly <1974->
|
||
| Indianapolis, IN, : Wiley, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
| CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves |
| Autore | Graves Kimberly <1974-> |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2010 |
| Descrizione fisica | 1 online resource (439 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer hackers - Examinations Computer networks - Examinations |
| ISBN |
1-282-68350-0
9786612683503 0-470-64286-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary Index |
| Record Nr. | UNINA-9910781161203321 |
Graves Kimberly <1974->
|
||
| Indianapolis, IN, : Wiley, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
CEH : certified ethical hacker study guide / / Kimberly Graves
| CEH : certified ethical hacker study guide / / Kimberly Graves |
| Autore | Graves Kimberly <1974-> |
| Edizione | [1st ed.] |
| Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2010 |
| Descrizione fisica | 1 online resource (439 p.) |
| Disciplina | 005.8 |
| Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Hackers - Examinations Computer networks - Examinations |
| ISBN |
1-282-68350-0
9786612683503 0-470-64286-6 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto |
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary Index |
| Record Nr. | UNINA-9910971594803321 |
Graves Kimberly <1974->
|
||
| Indianapolis, IN, : Wiley, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||