The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
Soggetto genere / forma | Electronic books. |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910458294803321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide [[electronic resource] ] : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Classificazione | 54.89 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Record Nr. | UNINA-9910784790303321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The CEH prep guide : the comprehensive guide to certified ethical hacking / / Ronald L. Krutz, Russell Dean Vines |
Autore | Krutz Ronald L. <1938-> |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Indianapolis, IN, : Wiley, c2007 |
Descrizione fisica | 1 online resource (770 p.) |
Disciplina |
004.16
005.8 |
Altri autori (Persone) | VinesRussell Dean <1952-> |
Soggetto topico |
Computer security - Testing - Examinations
Computer networks - Security measures - Examinations Computer networks - Examinations Computer hackers |
ISBN |
1-280-97384-6
9786610973842 0-470-23138-6 |
Classificazione | 54.89 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking; About the Authors; Credits; Contents; Foreword; Acknowledgments; Introduction; Exam Eligibility; Part I: The Business and Legal Issues of Ethical Hacking; Chapter 1: Introduction to Ethical Hacking; Terminology; Hacking History; Ethical Hacking Objectives and Motivations; Steps in Malicious Hacking; Hacker and Ethical Hacker Characteristics and Operations; Related Types of Computer Crime; Assessment Questions; Chapter 2: Legality and Ethics; Law and Legal Systems; Computer Crime Penalties; Ethics; Assessment Questions
Chapter 3: Penetration Testing for BusinessPenetration Testing from a Business Perspective; Justification of Penetration Testing through Risk Analysis; Management Responsibilities in Risk Analysis Relating to Penetration Testing; Assessment Questions; Part II: The Pre-Attack Phases; Chapter 4: Footprinting; Gathering Information; Locating the Network Range; Assessment Questions; Chapter 5: Scanning; Identifying Active Machines; Identifying Open Ports and Available Services; War Dialing; War Driving and War Walking; Fingerprinting; Mapping the Network; Assessment Questions Chapter 6: EnumeratingProtection Rings; Windows Architecture; Windows Security Elements; Enumerating Techniques for Windows; Countermeasures; Assessment Questions; Part III: Attack Techniques and Tools; Chapter 7 System Hacking Techniques; Password Guessing; Privilege Escalation; Password Cracking; Covering Tracks; Countermeasures; Assessment Questions; Chapter 8: Trojans, Backdoors, and Sniffers; Trojans and Backdoors; Sniffers; Assessment Questions; Chapter 9: Denial of Service Attacks and Session Hijacking; Denial of Service/Distributed Denial of Service (DoS/DDoS); Session Hijacking Assessment QuestionsChapter 10: Penetration Testing Steps; Penetration Testing Overview; Legal and Ethical Implications; The Three Pretest Phases; Penetration Testing Tools and Techniques; Wireless Network Penetration Testing; Social Engineering; Intrusion Detection System (IDS); Assessment Questions; Chapter 11: Linux Hacking Tools; Linux History; Scanning Networks with Linux Tools; Linux Hacking Tools; Linux Rootkits; Linux Security Tools; Assessment Questions; Chapter 12: Social Engineering and Physical Security; Social Engineering; Physical Security; Assessment Questions Part IV: Web Server and Database AttacksChapter 13: Web Server Hacking and Web Application Vulnerabilities; Web Server Hacking; Web Application Vulnerabilities; Countermeasures; Assessment Questions; Chapter 14:SQL Injection Vulnerabilities; SQL Injection Testing and Attacks; SQL Injection Prevention and Remediation; Automated SQL Injection Tools; Assessment Questions; Chapter 15: Cryptography; Symmetric Key Cryptography; Public Key Cryptosystems; Public Key Certificates; Cryptanalysis; Managing Encryption Keys; Email Security; Electronic Transaction Security; Wireless Security Disk Encryption |
Altri titoli varianti | Comprehensive guide to certified ethical hacking |
Record Nr. | UNINA-9910813170803321 |
Krutz Ronald L. <1938-> | ||
Indianapolis, IN, : Wiley, c2007 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud computing [[electronic resource] ] : moving IT out of the office |
Edizione | [1st edition] |
Pubbl/distr/stampa | Swindon, GBR, : British Informatics Society Ltd., 2012 |
Descrizione fisica | 1 online resource (59 p.) |
Disciplina | 004.16 |
Soggetto topico |
Cloud computing - Economic aspects
Information technology - Management |
Soggetto genere / forma | Electronic books. |
ISBN |
1-78017-131-5
1-78017-130-7 1-78017-132-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | section 1. What is the cloud? -- section 2. The case for the cloud -- section 3. Moving to the cloud -- section 4. Changing the IT infrastructure -- section 5. Security in the cloud. |
Record Nr. | UNINA-9910453549803321 |
Swindon, GBR, : British Informatics Society Ltd., 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud computing [[electronic resource] ] : moving IT out of the office |
Edizione | [1st edition] |
Pubbl/distr/stampa | Swindon, GBR, : British Informatics Society Ltd., 2012 |
Descrizione fisica | 1 online resource (59 p.) |
Disciplina | 004.16 |
Soggetto topico |
Cloud computing - Economic aspects
Information technology - Management |
ISBN |
1-78017-131-5
1-78017-130-7 1-78017-132-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | section 1. What is the cloud? -- section 2. The case for the cloud -- section 3. Moving to the cloud -- section 4. Changing the IT infrastructure -- section 5. Security in the cloud. |
Record Nr. | UNINA-9910790808203321 |
Swindon, GBR, : British Informatics Society Ltd., 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cloud computing [[electronic resource] ] : moving IT out of the office |
Edizione | [1st edition] |
Pubbl/distr/stampa | Swindon, GBR, : British Informatics Society Ltd., 2012 |
Descrizione fisica | 1 online resource (59 p.) |
Disciplina | 004.16 |
Soggetto topico |
Cloud computing - Economic aspects
Information technology - Management |
ISBN |
1-78017-131-5
1-78017-130-7 1-78017-132-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | section 1. What is the cloud? -- section 2. The case for the cloud -- section 3. Moving to the cloud -- section 4. Changing the IT infrastructure -- section 5. Security in the cloud. |
Record Nr. | UNINA-9910819280903321 |
Swindon, GBR, : British Informatics Society Ltd., 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
CODASPY'20 : proceedings of the Tenth ACM Conference on Data and Application Security and Privacy : March 16-18, 2020, New Orleans, LA, USA / / general chairs, Vassil Rouseev, Bhavani Thuraisingham |
Pubbl/distr/stampa | New York : , : Association for Computing Machinery, , 2020 |
Descrizione fisica | 1 online resource (392 pages) : illustrations |
Disciplina | 004.16 |
Collana | ACM conferences |
Soggetto topico |
Application software - Security measures
Computer security Data protection Online social networks - Security measures |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910412317203321 |
New York : , : Association for Computing Machinery, , 2020 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Coding iPhone apps for kids : a playful introduction to swift / Gloria Winquist and Matt McCarthy |
Autore | Winquist, Gloria |
Pubbl/distr/stampa | San Francisco, : No Starch Press, 2017 |
Descrizione fisica | XXI, 312 p. : ill. color. ; 24 cm |
Disciplina | 004.16 |
Altri autori (Persone) | McCarthy, Matt |
Soggetto topico |
Telefoni cellulari - Programmazione - Linguaggio Swift
Microelaboratori - Programmazione - Linguaggio Swift |
ISBN |
1593277563
9781593277567 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISANNIO-NAP0775395 |
Winquist, Gloria | ||
San Francisco, : No Starch Press, 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. del Sannio | ||
|
Communication in Critical Embedded Systems : First Workshop, WoCCES 2013, Brasília, Brazil, May, 10, 2013, Second Workshop, WoCCES 2014, Florianópolis, Brazil, May 9, 2014, Third Workshop, WoCCES 2015, Vitória, Brazil, May 22, 2015, 4th Workshop, WoCCES 2016, Salvador, Brazil, June 3, 2016, Revised Selected Papers / / edited by Kalinka Branco, Alex Pinto, Daniel Pigatto |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XV, 131 p. 68 illus.) |
Disciplina | 004.16 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Mobile computing
Multimedia information systems Computer organization Mobile Computing Multimedia Information Systems Computer Systems Organization and Communication Networks |
ISBN | 3-319-61403-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Distributed Algorithms -- Hardware and Software Architectures -- Integration of High Availability Clusters and Grids with Embedded Systems -- Media Access Control (MAC), cognitive radios and directional antennas -- Communication Group -- Mobile and Embedded Computing -- Middleware and Web Services -- Interaction between sensors and Mobile Robots -- GPU -- FPGA -- Fly by Wireless -- P2P, Mobile and Ad-Hoc Networks -- Safety and Certification -- Security -- Sensor and Vehicular Networks -- Unmanned systems (UAVs, UGVs). |
Record Nr. | UNINA-9910254811003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Companion of the 2018 ACM Conference on Computer Supported Cooperative Work and Social Computing / / Vanessa Evers, Association for Computing Machinery-Digital Library |
Autore | Evers Vanessa |
Pubbl/distr/stampa | New York, New York : , : ACM, , [2018] |
Descrizione fisica | 1 online resource (495 pages) |
Disciplina | 004.16 |
Collana | ACM Conferences. |
Soggetto topico | Microcomputer workstations |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910375700203321 |
Evers Vanessa | ||
New York, New York : , : ACM, , [2018] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|