CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 |
Descrizione fisica | 1 online resource (652 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Penetration testing (Computer security) - Examinations Computer networks - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-41930-1
1-119-25227-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions Chapter 16: Mobile Device Security |
Record Nr. | UNINA-9910271015303321 |
Oriyano Sean-Philip | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 |
Descrizione fisica | 1 online resource (652 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Penetration testing (Computer security) - Examinations Computer networks - Examinations |
ISBN |
1-119-41930-1
1-119-25227-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions Chapter 16: Mobile Device Security |
Record Nr. | UNINA-9910830928003321 |
Oriyano Sean-Philip | ||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Hacker techniques, tools, and incident handling / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014 |
Descrizione fisica | 1 online resource (525 pages) : illustrations |
Disciplina | 005.8 |
Collana | Jones & Bartlett Learning Information Systems Security & Assurance Series |
Soggetto topico |
Computer security
Computer networks - Security measures Hackers |
ISBN | 1-284-03170-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910164028603321 |
Oriyano Sean-Philip | ||
Burlington, Massachusetts : , : Jones & Bartlett Learning, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Penetration testing essentials / / Sean Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [First edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, , 2017 |
Descrizione fisica | 1 online resource (315 pages) : illustrations (some color) |
Disciplina | 005.8092 |
Collana | THEi Wiley ebooks |
Soggetto topico |
Penetration testing (Computer security)
Hackers Computer crimes - Prevention |
ISBN |
1-119-32398-3
1-119-41935-2 1-119-23533-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910151746903321 |
Oriyano Sean-Philip | ||
Indianapolis, Indiana : , : Sybex, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Penetration testing essentials / / Sean Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [First edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, , 2017 |
Descrizione fisica | 1 online resource (315 pages) : illustrations (some color) |
Disciplina | 005.8092 |
Collana | THEi Wiley ebooks |
Soggetto topico |
Penetration testing (Computer security)
Hackers Computer crimes - Prevention |
ISBN |
1-119-32398-3
1-119-41935-2 1-119-23533-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910823442703321 |
Oriyano Sean-Philip | ||
Indianapolis, Indiana : , : Sybex, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|