(ISC)2 CCSP certified cloud security professional : official study guide / / Ben Malisow |
Autore | Malisow Ben |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Sybex, , [2020] |
Descrizione fisica | 1 online resource (381 pages) |
Disciplina | 005.8 |
Soggetto topico | Computer security - Testing - Examinations |
ISBN |
1-119-60336-6
1-119-60338-2 1-119-60335-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910555029303321 |
Malisow Ben | ||
Hoboken, New Jersey : , : Sybex, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
(ISC)2 CCSP certified cloud security professional : official study guide / / Ben Malisow |
Autore | Malisow Ben |
Edizione | [Second edition.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Sybex, , [2020] |
Descrizione fisica | 1 online resource (381 pages) |
Disciplina | 005.8 |
Soggetto topico | Computer security - Testing - Examinations |
ISBN |
1-119-60336-6
1-119-60338-2 1-119-60335-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910829846303321 |
Malisow Ben | ||
Hoboken, New Jersey : , : Sybex, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910458294803321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Classificazione | 54.89 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910784790303321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Hackers |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Classificazione | 54.89 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Altri titoli varianti | Comprehensive guide to certified ethical hacking |
Record Nr. | UNINA-9910813170803321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|