CEH V9 certified ethical hacker study guide /
Material type:
- 9781119252245
- Electronic data processing personnel -- Certification
- Computer security -- Examinations -- Study guides
- Hackers -- Examinations -- Study guides
- Computer networks -- Examinations -- Study guides
- COMPUTERS -- Internet -- Security
- COMPUTERS -- Networking -- Security
- COMPUTERS -- Security -- General
- Computer networks -- Examinations
- Computer security -- Examinations
- Electronic data processing personnel -- Certification
- 005.8 22
- QA76.3 .G6875 2010eb
Item type | Current library | Call number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|
![]() |
Air University Central Library Islamabad Computer Science | 005.8 Or41C (Browse shelf(Opens below)) | Checked out | 08/24/2024 | P12941 |
Includes bibliographical references and index.
At a Glance -- Table of Exercises -- Introduction -- Assessment Test -- Answers to Assessment Test -- 1. : Introduction to Ethical Hacking, Ethics, and Legality -- 2. : Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering -- 3. : Gathering Network and Host Information: Scanning and Enumeration -- 4. : System Hacking: Password Cracking, Escalating Privileges, and Hiding Files -- 5. : Trojans, Backdoors, Viruses, and Worms -- 6. : Gathering Data from Networks: Sniffers -- 7. : Denial of Service and Session Hijacking -- 8. : Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques -- 9. : Attacking Applications: SQL Injection and Buffer Overflows -- 10. : Wireless Network Hacking -- 11. : Physical Site Security -- 12. : Hacking Linux Systems -- 13. : Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls -- 14. : Cryptography -- 15. : Performing a Penetration Test -- Appendix: About the Companion CD.
Prepare for the new version of CEH certification with this advanced guide. Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice.:; Covers eth.
There are no comments on this title.