CEH : certified ethical hacker study guide / Kimberly Graves
Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Indianapolis, Ind : Wiley Pub, c2010Edition: Online-AusgDescription: Online-Ressource (1 online resource (xxxvii, 392 p.)) : illISBN:- 9781282683501
- 1282683500
- 9780470642863
- 9780470525203
- Computer security
- Penetration testing (Computer security)
- Computer hackers
- Computer networks
- Electronic data processing personnel
- Computer security -- Examinations -- Study guides
- Computer hackers -- Examinations -- Study guides
- Computer networks -- Examinations -- Study guides
- Computer hackers ; Examinations ; Study guides
- Computer networks ; Examinations ; Study guides
- Computer security ; Examinations ; Study guides
- Electronic data processing personnel ; Certification
- Electronic books
- 005.8
- QA76.3
Contents:
Summary: Full Coverage of All Exam Objectives for the CEH Exams 312-50and EC0-350 Thoroughly prepare for the challenging CEH Certified EthicalHackers exam with this comprehensive study guide. The book providesfull coverage of exam topics, real-world examples,and includes a CD with chapter review questions, twofull-length practice exams, electronic flashcards, a glossary ofkey terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning,enumeration, system hacking, trojans and backdoors, sniffers,denial of service, social engineering, session hijacking, hackingWeb servers, Web application vulnerabilities, and moreWalks you through exam topics and includes plenty of real-worldscenarios to help reinforce conceptsIncludes a CD with an assessment test, review questions,practice exams, electronic flashcards, and the entire book in asearchable pdf.Summary: CEH: Certified Ethical Hacker Study Guide -- Acknowledgments -- About the Author -- Contents at a Glance -- Contents -- Table of Exercises -- Introduction -- Assessment Test -- Answers to Assessment Test -- Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality -- Defining Ethical Hacking -- How to Be Ethical -- Keeping It Legal -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering -- Reconnaissance -- Information-Gathering Methodology -- Social Engineering -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 3: Gathering Network and Host Information: Scanning and Enumeration -- Scanning -- Enumeration -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files -- The Simplest Way to Get a Password -- Types of Passwords -- Cracking a Password -- Understanding Keyloggers and Other Spyware Technologies -- Escalating Privileges -- Understanding Rootkits -- Hiding Files -- Understanding Steganography Technologies -- Covering Your Tracks and Erasing Evidence -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 5: Trojans, Backdoors, Viruses, and Worms -- Trojans and Backdoors -- Viruses and Worms -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions -- Chapter 6: Gathering Data from Networks: Sniffers -- Understanding Host-to-Host Communication -- How a Sniffer Works -- Sniffing Countermeasures -- Bypassing the Limitations of Switches -- Wireshark Filters -- Understanding MAC Flooding and DNS Spoofing -- Summary -- Exam Essentials -- Review Questions -- Answers to Review Questions.PPN: PPN: 808943189Package identifier: Produktsigel: ZDB-26-MYL | ZDB-30-PAD | ZDB-30-PQE | ZDB-38-EBR
CEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms
Chapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary
Index
No physical items for this record