top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Descrizione fisica 1 online resource (652 p.)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Penetration testing (Computer security) - Examinations
Computer networks - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-119-41930-1
1-119-25227-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials
Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking
Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools
DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions
Chapter 16: Mobile Device Security
Record Nr. UNINA-9910271015303321
Oriyano Sean-Philip  
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Descrizione fisica 1 online resource (652 p.)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Penetration testing (Computer security) - Examinations
Computer networks - Examinations
ISBN 1-119-41930-1
1-119-25227-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials
Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking
Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools
DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions
Chapter 16: Mobile Device Security
Record Nr. UNINA-9910830928003321
Oriyano Sean-Philip  
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Hacker techniques, tools, and incident handling / / Sean-Philip Oriyano
Hacker techniques, tools, and incident handling / / Sean-Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [Second edition.]
Pubbl/distr/stampa Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014
Descrizione fisica 1 online resource (525 pages) : illustrations
Disciplina 005.8
Collana Jones & Bartlett Learning Information Systems Security & Assurance Series
Soggetto topico Computer security
Computer networks - Security measures
Hackers
ISBN 1-284-03170-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910164028603321
Oriyano Sean-Philip  
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Penetration testing essentials / / Sean Philip Oriyano
Penetration testing essentials / / Sean Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, , 2017
Descrizione fisica 1 online resource (315 pages) : illustrations (some color)
Disciplina 005.8092
Collana THEi Wiley ebooks
Soggetto topico Penetration testing (Computer security)
Hackers
Computer crimes - Prevention
ISBN 1-119-32398-3
1-119-41935-2
1-119-23533-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910151746903321
Oriyano Sean-Philip  
Indianapolis, Indiana : , : Sybex, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Penetration testing essentials / / Sean Philip Oriyano
Penetration testing essentials / / Sean Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [First edition.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, , 2017
Descrizione fisica 1 online resource (315 pages) : illustrations (some color)
Disciplina 005.8092
Collana THEi Wiley ebooks
Soggetto topico Penetration testing (Computer security)
Hackers
Computer crimes - Prevention
ISBN 1-119-32398-3
1-119-41935-2
1-119-23533-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910823442703321
Oriyano Sean-Philip  
Indianapolis, Indiana : , : Sybex, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui