(ISC)2 CISSP certified information systems security professional : official study guide / / Mike Chapple, James M. Stewart, Darril Gibson |
Autore | Chapple Mike |
Edizione | [Eighth edition.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018] |
Descrizione fisica | 1 online resource (1,107 pages) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Computer networks - Security measures - Examinations |
ISBN |
1-119-54956-6
1-119-47595-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security governance through principles and policies -- Personnel security and risk management concepts -- Business continuity planning -- Laws, regulations, and compliance -- Protecting security of assets -- Cryptography and symmetric key algorithms -- PKI and cryptographic applications -- Principles of security models, design and capabilities -- Security vulnerabilities, threats, and countermeasures -- Physical security requirements -- Secure network architecture and securing network components -- Secure communications and network attacks -- Managing identity and authentication -- Controlling and monitoring access -- Security assessment and testing -- Managing security operations -- Preventing and responding to incidents -- Disaster recovery planning -- Investigations and ethics -- Software development security -- Malicious code and application attacks -- Appendix A. Answers to review questions -- Appendix B. Answers to written labs. |
Record Nr. | UNINA-9910555053203321 |
Chapple Mike
![]() |
||
Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines |
Autore | Gregg Michael H |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., Inc., 2012 |
Descrizione fisica | 1 online resource (558 p.) |
Disciplina |
005.8
005.8076 |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer networks - Security measures - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-67580-2
9786613652737 1-118-22272-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CASP CompTIA Advanced Security Practitioner Study Guide; Contents; Foreword; Introduction; Before You Begin the CompTIA CASP Certification Exam; How to Become a CASP Certified Professional; Who Should Read This Book?; How This Book Is Organized; Exam Strategy; How to Use This Book and Companion Website; The CASP (2011 Edition) Exam Objectives; Chapter 1: Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Symmetric Encryption; Asymmetric Encryption; Hybrid Encryption; Hashing; Digital Signatures; Public Key Infrastructure; Cryptographic Solutions
Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System Endpoint Security SoftwareAnti-malware; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Summary; Exam Essentials; Review Questions; Chapter 5: Application Security and Penetration Testing; Application Security; Specific Application Issues; Application Sandboxing; Application Security Framework; Standard Libraries; Secure Coding Standards; Application Exploits; Escalation of Privilege; Improper Storage of Sensitive Data; Cookie Storage and Transmission; Process Handling at the Client and Server; Security Assessments and Penetration Testing; Summary Exam EssentialsReview Questions; Chapter 6: Risk Management; Risk Terminology; Identifying Vulnerabilities; Operational Risks; The Risk Assessment Process; Best Practices for Risk Assessments; Summary; Exam Essentials; Review Questions; Chapter 7: Policies, Procedures, and Incident Response; A High-Level View of Documentation; Business Documents Used to Support Security; Documents and Controls Used for Sensitive Information; Auditing Requirements and Frequency; The Incident Response Framework; Digital Forensics; The Role of Training and Employee Awareness; Summary; Exam Essentials Review QuestionsChapter 8: Security Research and Analysis; Analyzing Industry Trends and Outlining Potential Impact; Carrying Out Relevant Analysis to Secure the Enterprise; Summary; Exam Essentials; Review Questions; Chapter 9: Enterprise Security Integration; Integrate Enterprise Disciplines to Achieve Secure Solutions; Explain the Security Impact of Interorganizational Change; Summary; Exam Essentials; Review Questions; Chapter 10: Security Controls for Communication and Collaboration; Selecting and Distinguishing the Appropriate Security Controls Advanced Authentication Tools, Techniques, and Concepts |
Altri titoli varianti | CompTIA Advanced Security Practitioner study guide |
Record Nr. | UNINA-9910461334203321 |
Gregg Michael H
![]() |
||
Indianapolis, IN, : Wiley Pub., Inc., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines |
Autore | Gregg Michael H |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., Inc., 2012 |
Descrizione fisica | 1 online resource (558 p.) |
Disciplina |
005.8
005.8076 |
Altri autori (Persone) | HainesBilly (Computer scientist) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer networks - Security measures - Examinations |
ISBN |
1-118-23661-0
1-280-67580-2 9786613652737 1-118-22272-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CASP CompTIA Advanced Security Practitioner Study Guide; Contents; Foreword; Introduction; Before You Begin the CompTIA CASP Certification Exam; How to Become a CASP Certified Professional; Who Should Read This Book?; How This Book Is Organized; Exam Strategy; How to Use This Book and Companion Website; The CASP (2011 Edition) Exam Objectives; Chapter 1: Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Symmetric Encryption; Asymmetric Encryption; Hybrid Encryption; Hashing; Digital Signatures; Public Key Infrastructure; Cryptographic Solutions
Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System Endpoint Security SoftwareAnti-malware; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Summary; Exam Essentials; Review Questions; Chapter 5: Application Security and Penetration Testing; Application Security; Specific Application Issues; Application Sandboxing; Application Security Framework; Standard Libraries; Secure Coding Standards; Application Exploits; Escalation of Privilege; Improper Storage of Sensitive Data; Cookie Storage and Transmission; Process Handling at the Client and Server; Security Assessments and Penetration Testing; Summary Exam EssentialsReview Questions; Chapter 6: Risk Management; Risk Terminology; Identifying Vulnerabilities; Operational Risks; The Risk Assessment Process; Best Practices for Risk Assessments; Summary; Exam Essentials; Review Questions; Chapter 7: Policies, Procedures, and Incident Response; A High-Level View of Documentation; Business Documents Used to Support Security; Documents and Controls Used for Sensitive Information; Auditing Requirements and Frequency; The Incident Response Framework; Digital Forensics; The Role of Training and Employee Awareness; Summary; Exam Essentials Review QuestionsChapter 8: Security Research and Analysis; Analyzing Industry Trends and Outlining Potential Impact; Carrying Out Relevant Analysis to Secure the Enterprise; Summary; Exam Essentials; Review Questions; Chapter 9: Enterprise Security Integration; Integrate Enterprise Disciplines to Achieve Secure Solutions; Explain the Security Impact of Interorganizational Change; Summary; Exam Essentials; Review Questions; Chapter 10: Security Controls for Communication and Collaboration; Selecting and Distinguishing the Appropriate Security Controls Advanced Authentication Tools, Techniques, and Concepts |
Altri titoli varianti | CompTIA Advanced Security Practitioner study guide |
Record Nr. | UNINA-9910790472403321 |
Gregg Michael H
![]() |
||
Indianapolis, IN, : Wiley Pub., Inc., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines |
Autore | Gregg Michael H |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley Pub., Inc., 2012 |
Descrizione fisica | 1 online resource (558 p.) |
Disciplina |
005.8
005.8076 |
Altri autori (Persone) | HainesBilly (Computer scientist) |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer networks - Security measures - Examinations |
ISBN |
1-118-23661-0
1-280-67580-2 9786613652737 1-118-22272-5 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CASP CompTIA Advanced Security Practitioner Study Guide; Contents; Foreword; Introduction; Before You Begin the CompTIA CASP Certification Exam; How to Become a CASP Certified Professional; Who Should Read This Book?; How This Book Is Organized; Exam Strategy; How to Use This Book and Companion Website; The CASP (2011 Edition) Exam Objectives; Chapter 1: Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Symmetric Encryption; Asymmetric Encryption; Hybrid Encryption; Hashing; Digital Signatures; Public Key Infrastructure; Cryptographic Solutions
Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System Endpoint Security SoftwareAnti-malware; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Summary; Exam Essentials; Review Questions; Chapter 5: Application Security and Penetration Testing; Application Security; Specific Application Issues; Application Sandboxing; Application Security Framework; Standard Libraries; Secure Coding Standards; Application Exploits; Escalation of Privilege; Improper Storage of Sensitive Data; Cookie Storage and Transmission; Process Handling at the Client and Server; Security Assessments and Penetration Testing; Summary Exam EssentialsReview Questions; Chapter 6: Risk Management; Risk Terminology; Identifying Vulnerabilities; Operational Risks; The Risk Assessment Process; Best Practices for Risk Assessments; Summary; Exam Essentials; Review Questions; Chapter 7: Policies, Procedures, and Incident Response; A High-Level View of Documentation; Business Documents Used to Support Security; Documents and Controls Used for Sensitive Information; Auditing Requirements and Frequency; The Incident Response Framework; Digital Forensics; The Role of Training and Employee Awareness; Summary; Exam Essentials Review QuestionsChapter 8: Security Research and Analysis; Analyzing Industry Trends and Outlining Potential Impact; Carrying Out Relevant Analysis to Secure the Enterprise; Summary; Exam Essentials; Review Questions; Chapter 9: Enterprise Security Integration; Integrate Enterprise Disciplines to Achieve Secure Solutions; Explain the Security Impact of Interorganizational Change; Summary; Exam Essentials; Review Questions; Chapter 10: Security Controls for Communication and Collaboration; Selecting and Distinguishing the Appropriate Security Controls Advanced Authentication Tools, Techniques, and Concepts |
Altri titoli varianti | CompTIA Advanced Security Practitioner study guide |
Record Nr. | UNINA-9910821486903321 |
Gregg Michael H
![]() |
||
Indianapolis, IN, : Wiley Pub., Inc., 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves |
Autore | Graves Kimberly <1974-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2010 |
Descrizione fisica | 1 online resource (439 p.) |
Disciplina | 005.8 |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer hackers - Examinations Computer networks - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-68350-0
9786612683503 0-470-64286-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary Index |
Record Nr. | UNINA-9910456406203321 |
Graves Kimberly <1974->
![]() |
||
Indianapolis, IN, : Wiley, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves |
Autore | Graves Kimberly <1974-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2010 |
Descrizione fisica | 1 online resource (439 p.) |
Disciplina | 005.8 |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer hackers - Examinations Computer networks - Examinations |
ISBN |
1-282-68350-0
9786612683503 0-470-64286-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary Index |
Record Nr. | UNINA-9910781161203321 |
Graves Kimberly <1974->
![]() |
||
Indianapolis, IN, : Wiley, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves |
Autore | Graves Kimberly <1974-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, 2010 |
Descrizione fisica | 1 online resource (439 p.) |
Disciplina | 005.8 |
Soggetto topico |
Electronic data processing personnel - Certification
Computer security - Examinations Computer hackers - Examinations Computer networks - Examinations |
ISBN |
1-282-68350-0
9786612683503 0-470-64286-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary Index |
Record Nr. | UNINA-9910807023703321 |
Graves Kimberly <1974->
![]() |
||
Indianapolis, IN, : Wiley, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 |
Descrizione fisica | 1 online resource (652 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Penetration testing (Computer security) - Examinations Computer networks - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-41930-1
1-119-25227-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions Chapter 16: Mobile Device Security |
Record Nr. | UNINA-9910271015303321 |
Oriyano Sean-Philip
![]() |
||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano |
Autore | Oriyano Sean-Philip |
Edizione | [3rd ed.] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 |
Descrizione fisica | 1 online resource (652 p.) |
Disciplina | 005.8 |
Soggetto topico |
Computer security - Examinations
Penetration testing (Computer security) - Examinations Computer networks - Examinations |
ISBN |
1-119-41930-1
1-119-25227-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions Chapter 16: Mobile Device Security |
Record Nr. | UNINA-9910830928003321 |
Oriyano Sean-Philip
![]() |
||
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
CEH v10 certified ethical hacker study guide / / Ric Messier |
Autore | Messier Ric |
Edizione | [1st edition] |
Pubbl/distr/stampa | Indianapolis, Indiana : , : Sybex, , [2019] |
Descrizione fisica | 1 online resource (587 pages) |
Disciplina | 005.8 |
Soggetto topico | Computer security - Examinations |
Soggetto genere / forma | Electronic books. |
ISBN |
1-119-53326-0
1-119-53325-2 1-119-53324-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555063503321 |
Messier Ric
![]() |
||
Indianapolis, Indiana : , : Sybex, , [2019] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|