top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
(ISC)2 CISSP certified information systems security professional : official study guide / / Mike Chapple, James M. Stewart, Darril Gibson
(ISC)2 CISSP certified information systems security professional : official study guide / / Mike Chapple, James M. Stewart, Darril Gibson
Autore Chapple Mike
Edizione [Eighth edition.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018]
Descrizione fisica 1 online resource (1,107 pages)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Computer networks - Security measures - Examinations
ISBN 1-119-54956-6
1-119-47595-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security governance through principles and policies -- Personnel security and risk management concepts -- Business continuity planning -- Laws, regulations, and compliance -- Protecting security of assets -- Cryptography and symmetric key algorithms -- PKI and cryptographic applications -- Principles of security models, design and capabilities -- Security vulnerabilities, threats, and countermeasures -- Physical security requirements -- Secure network architecture and securing network components -- Secure communications and network attacks -- Managing identity and authentication -- Controlling and monitoring access -- Security assessment and testing -- Managing security operations -- Preventing and responding to incidents -- Disaster recovery planning -- Investigations and ethics -- Software development security -- Malicious code and application attacks -- Appendix A. Answers to review questions -- Appendix B. Answers to written labs.
Record Nr. UNINA-9910555053203321
Chapple Mike  
Indianapolis, Indiana : , : Sybex, A Wiley Brand, , [2018]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines
Autore Gregg Michael H
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., Inc., 2012
Descrizione fisica 1 online resource (558 p.)
Disciplina 005.8
005.8076
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Security measures - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-280-67580-2
9786613652737
1-118-22272-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CASP CompTIA Advanced Security Practitioner Study Guide; Contents; Foreword; Introduction; Before You Begin the CompTIA CASP Certification Exam; How to Become a CASP Certified Professional; Who Should Read This Book?; How This Book Is Organized; Exam Strategy; How to Use This Book and Companion Website; The CASP (2011 Edition) Exam Objectives; Chapter 1: Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Symmetric Encryption; Asymmetric Encryption; Hybrid Encryption; Hashing; Digital Signatures; Public Key Infrastructure; Cryptographic Solutions
Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System
Endpoint Security SoftwareAnti-malware; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Summary; Exam Essentials; Review Questions; Chapter 5: Application Security and Penetration Testing; Application Security; Specific Application Issues; Application Sandboxing; Application Security Framework; Standard Libraries; Secure Coding Standards; Application Exploits; Escalation of Privilege; Improper Storage of Sensitive Data; Cookie Storage and Transmission; Process Handling at the Client and Server; Security Assessments and Penetration Testing; Summary
Exam EssentialsReview Questions; Chapter 6: Risk Management; Risk Terminology; Identifying Vulnerabilities; Operational Risks; The Risk Assessment Process; Best Practices for Risk Assessments; Summary; Exam Essentials; Review Questions; Chapter 7: Policies, Procedures, and Incident Response; A High-Level View of Documentation; Business Documents Used to Support Security; Documents and Controls Used for Sensitive Information; Auditing Requirements and Frequency; The Incident Response Framework; Digital Forensics; The Role of Training and Employee Awareness; Summary; Exam Essentials
Review QuestionsChapter 8: Security Research and Analysis; Analyzing Industry Trends and Outlining Potential Impact; Carrying Out Relevant Analysis to Secure the Enterprise; Summary; Exam Essentials; Review Questions; Chapter 9: Enterprise Security Integration; Integrate Enterprise Disciplines to Achieve Secure Solutions; Explain the Security Impact of Interorganizational Change; Summary; Exam Essentials; Review Questions; Chapter 10: Security Controls for Communication and Collaboration; Selecting and Distinguishing the Appropriate Security Controls
Advanced Authentication Tools, Techniques, and Concepts
Altri titoli varianti CompTIA Advanced Security Practitioner study guide
Record Nr. UNINA-9910461334203321
Gregg Michael H  
Indianapolis, IN, : Wiley Pub., Inc., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines
Autore Gregg Michael H
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., Inc., 2012
Descrizione fisica 1 online resource (558 p.)
Disciplina 005.8
005.8076
Altri autori (Persone) HainesBilly (Computer scientist)
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Security measures - Examinations
ISBN 1-118-23661-0
1-280-67580-2
9786613652737
1-118-22272-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CASP CompTIA Advanced Security Practitioner Study Guide; Contents; Foreword; Introduction; Before You Begin the CompTIA CASP Certification Exam; How to Become a CASP Certified Professional; Who Should Read This Book?; How This Book Is Organized; Exam Strategy; How to Use This Book and Companion Website; The CASP (2011 Edition) Exam Objectives; Chapter 1: Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Symmetric Encryption; Asymmetric Encryption; Hybrid Encryption; Hashing; Digital Signatures; Public Key Infrastructure; Cryptographic Solutions
Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System
Endpoint Security SoftwareAnti-malware; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Summary; Exam Essentials; Review Questions; Chapter 5: Application Security and Penetration Testing; Application Security; Specific Application Issues; Application Sandboxing; Application Security Framework; Standard Libraries; Secure Coding Standards; Application Exploits; Escalation of Privilege; Improper Storage of Sensitive Data; Cookie Storage and Transmission; Process Handling at the Client and Server; Security Assessments and Penetration Testing; Summary
Exam EssentialsReview Questions; Chapter 6: Risk Management; Risk Terminology; Identifying Vulnerabilities; Operational Risks; The Risk Assessment Process; Best Practices for Risk Assessments; Summary; Exam Essentials; Review Questions; Chapter 7: Policies, Procedures, and Incident Response; A High-Level View of Documentation; Business Documents Used to Support Security; Documents and Controls Used for Sensitive Information; Auditing Requirements and Frequency; The Incident Response Framework; Digital Forensics; The Role of Training and Employee Awareness; Summary; Exam Essentials
Review QuestionsChapter 8: Security Research and Analysis; Analyzing Industry Trends and Outlining Potential Impact; Carrying Out Relevant Analysis to Secure the Enterprise; Summary; Exam Essentials; Review Questions; Chapter 9: Enterprise Security Integration; Integrate Enterprise Disciplines to Achieve Secure Solutions; Explain the Security Impact of Interorganizational Change; Summary; Exam Essentials; Review Questions; Chapter 10: Security Controls for Communication and Collaboration; Selecting and Distinguishing the Appropriate Security Controls
Advanced Authentication Tools, Techniques, and Concepts
Altri titoli varianti CompTIA Advanced Security Practitioner study guide
Record Nr. UNINA-9910790472403321
Gregg Michael H  
Indianapolis, IN, : Wiley Pub., Inc., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines
CASP [[electronic resource] ] : CompTIA Advanced Security Practitioner study guide (exam cas-001) / / Michael Gregg, and Billy Haines
Autore Gregg Michael H
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, IN, : Wiley Pub., Inc., 2012
Descrizione fisica 1 online resource (558 p.)
Disciplina 005.8
005.8076
Altri autori (Persone) HainesBilly (Computer scientist)
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer networks - Security measures - Examinations
ISBN 1-118-23661-0
1-280-67580-2
9786613652737
1-118-22272-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CASP CompTIA Advanced Security Practitioner Study Guide; Contents; Foreword; Introduction; Before You Begin the CompTIA CASP Certification Exam; How to Become a CASP Certified Professional; Who Should Read This Book?; How This Book Is Organized; Exam Strategy; How to Use This Book and Companion Website; The CASP (2011 Edition) Exam Objectives; Chapter 1: Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Symmetric Encryption; Asymmetric Encryption; Hybrid Encryption; Hashing; Digital Signatures; Public Key Infrastructure; Cryptographic Solutions
Cryptographic AttacksSummary; Exam Essentials; Review Questions; Chapter 2: Comprehensive Security Solutions; Advanced Network Design; TCP/IP; Secure Communication Solutions; Secure Facility Solutions; Secure Network Infrastructure Design; Summary; Exam Essentials; Review Questions; Chapter 3: Securing Virtualized, Distributed, and Shared Computing; Enterprise Security; Cloud Computing; Virtualization; Virtual LANs; Enterprise Storage; Summary; Exam Essentials; Review Questions; Chapter 4: Host Security; Firewalls and Access Control Lists; Host-Based Firewalls; Trusted Operating System
Endpoint Security SoftwareAnti-malware; Host Hardening; Asset Management; Data Exfiltration; Intrusion Detection and Prevention; Summary; Exam Essentials; Review Questions; Chapter 5: Application Security and Penetration Testing; Application Security; Specific Application Issues; Application Sandboxing; Application Security Framework; Standard Libraries; Secure Coding Standards; Application Exploits; Escalation of Privilege; Improper Storage of Sensitive Data; Cookie Storage and Transmission; Process Handling at the Client and Server; Security Assessments and Penetration Testing; Summary
Exam EssentialsReview Questions; Chapter 6: Risk Management; Risk Terminology; Identifying Vulnerabilities; Operational Risks; The Risk Assessment Process; Best Practices for Risk Assessments; Summary; Exam Essentials; Review Questions; Chapter 7: Policies, Procedures, and Incident Response; A High-Level View of Documentation; Business Documents Used to Support Security; Documents and Controls Used for Sensitive Information; Auditing Requirements and Frequency; The Incident Response Framework; Digital Forensics; The Role of Training and Employee Awareness; Summary; Exam Essentials
Review QuestionsChapter 8: Security Research and Analysis; Analyzing Industry Trends and Outlining Potential Impact; Carrying Out Relevant Analysis to Secure the Enterprise; Summary; Exam Essentials; Review Questions; Chapter 9: Enterprise Security Integration; Integrate Enterprise Disciplines to Achieve Secure Solutions; Explain the Security Impact of Interorganizational Change; Summary; Exam Essentials; Review Questions; Chapter 10: Security Controls for Communication and Collaboration; Selecting and Distinguishing the Appropriate Security Controls
Advanced Authentication Tools, Techniques, and Concepts
Altri titoli varianti CompTIA Advanced Security Practitioner study guide
Record Nr. UNINA-9910821486903321
Gregg Michael H  
Indianapolis, IN, : Wiley Pub., Inc., 2012
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
Autore Graves Kimberly <1974->
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2010
Descrizione fisica 1 online resource (439 p.)
Disciplina 005.8
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer hackers - Examinations
Computer networks - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-282-68350-0
9786612683503
0-470-64286-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary
Index
Record Nr. UNINA-9910456406203321
Graves Kimberly <1974->  
Indianapolis, IN, : Wiley, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
Autore Graves Kimberly <1974->
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2010
Descrizione fisica 1 online resource (439 p.)
Disciplina 005.8
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer hackers - Examinations
Computer networks - Examinations
ISBN 1-282-68350-0
9786612683503
0-470-64286-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary
Index
Record Nr. UNINA-9910781161203321
Graves Kimberly <1974->  
Indianapolis, IN, : Wiley, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
CEH [[electronic resource] ] : certified ethical hacker study guide / / Kimberly Graves
Autore Graves Kimberly <1974->
Edizione [1st ed.]
Pubbl/distr/stampa Indianapolis, IN, : Wiley, 2010
Descrizione fisica 1 online resource (439 p.)
Disciplina 005.8
Soggetto topico Electronic data processing personnel - Certification
Computer security - Examinations
Computer hackers - Examinations
Computer networks - Examinations
ISBN 1-282-68350-0
9786612683503
0-470-64286-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary
Index
Record Nr. UNINA-9910807023703321
Graves Kimberly <1974->  
Indianapolis, IN, : Wiley, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Descrizione fisica 1 online resource (652 p.)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Penetration testing (Computer security) - Examinations
Computer networks - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-119-41930-1
1-119-25227-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials
Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking
Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools
DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions
Chapter 16: Mobile Device Security
Record Nr. UNINA-9910271015303321
Oriyano Sean-Philip  
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
CEH certified ethical hacker : study guide : version 9 / / Sean-Philip Oriyano
Autore Oriyano Sean-Philip
Edizione [3rd ed.]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Descrizione fisica 1 online resource (652 p.)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Penetration testing (Computer security) - Examinations
Computer networks - Examinations
ISBN 1-119-41930-1
1-119-25227-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Copyright; Dedication; Acknowledgments; About the Author; Introduction; Exam 312-50 Exam Objectives; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking; Hacking: the Evolution; So, What Is an Ethical Hacker?; Summary; Exam Essentials; Review Questions; Chapter 2: System Fundamentals; Exploring Network Topologies; Working with the Open Systems Interconnection Model; Dissecting the TCP/IP Suite; IP Subnetting; Hexadecimal vs. Binary; Exploring TCP/IP Ports; Understanding Network Devices; Working with MAC Addresses
Intrusion Prevention and Intrusion Detection SystemsNetwork Security; Knowing Operating Systems; Backups and Archiving; Summary; Exam Essentials; Review Questions; Chapter 3: Cryptography; Cryptography: Early Applications and Examples; Cryptography in Action; Understanding Hashing; Issues with Cryptography; Applications of Cryptography; Summary; Exam Essentials; Review Questions; Chapter 4: Footprinting; Understanding the Steps of Ethical Hacking; What Is Footprinting?; Terminology in Footprinting; Threats Introduced by Footprinting; The Footprinting Process; Summary; Exam Essentials
Review QuestionsChapter 5: Scanning; What Is Scanning?; Checking for Live Systems; Checking the Status of Ports; The Family Tree of Scans; OS Fingerprinting; Countermeasures; Vulnerability Scanning; Mapping the Network; Using Proxies; Summary; Exam Essentials; Review Questions; Chapter 6: Enumeration; A Quick Review; What Is Enumeration?; About Windows Enumeration; Linux Basic; Enumeration with SNMP; Unix and Linux Enumeration; LDAP and Directory Service Enumeration; Enumeration Using NTP; SMTP Enumeration; Summary; Exam Essentials; Review Questions; Chapter 7: System Hacking
Up to This PointSystem Hacking; Summary; Exam Essentials; Review Questions; Chapter 8: Malware; Malware; Overt and Covert Channels; Summary; Exam Essentials; Review Questions; Chapter 9: Sniffers; Understanding Sniffers; Using a Sniffer; Switched Network Sniffing; Summary; Exam Essentials; Review Questions; Chapter 10: Social Engineering; What Is Social Engineering?; Social Networking to Gather Information?; Commonly Employed Threats; Identity Theft; Summary; Exam Essentials; Review Questions; Chapter 11: Denial of Service; Understanding DoS; Understanding DDoS; DoS Tools; DDoS Tools
DoS Defensive StrategiesDoS Pen-Testing Considerations; Summary; Exam Essentials; Review Questions; Chapter 12: Session Hijacking; Understanding Session Hijacking; Exploring Defensive Strategies; Summary; Exam Essentials; Review Questions; Chapter 13: Web Servers and Applications; Exploring the Client-Server Relationship; Summary; Exam Essentials; Review Questions; Chapter 14: SQL Injection; Introducing SQL Injection; Summary; Exam Essentials; Review Questions; Chapter 15: Hacking Wi-Fi and Bluetooth; What Is a Wireless Network?; Summary; Exam Essentials; Review Questions
Chapter 16: Mobile Device Security
Record Nr. UNINA-9910830928003321
Oriyano Sean-Philip  
Indianapolis, Indiana : , : Sybex, a Wiley brand, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
CEH v10 certified ethical hacker study guide / / Ric Messier
CEH v10 certified ethical hacker study guide / / Ric Messier
Autore Messier Ric
Edizione [1st edition]
Pubbl/distr/stampa Indianapolis, Indiana : , : Sybex, , [2019]
Descrizione fisica 1 online resource (587 pages)
Disciplina 005.8
Soggetto topico Computer security - Examinations
Soggetto genere / forma Electronic books.
ISBN 1-119-53326-0
1-119-53325-2
1-119-53324-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910555063503321
Messier Ric  
Indianapolis, Indiana : , : Sybex, , [2019]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui