The CEH prep guide the comprehensive guide to certified ethical hacking
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
2008
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9 .A25 .K79 2008 |
MARC
| LEADER | 00000nam a2200000 c 4500 | ||
|---|---|---|---|
| 001 | 94991 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220004238.0 | ||
| 008 | 130221 20082008ii b 001 0 eng d | ||
| 020 | |a 9780470135921 (hbk) | ||
| 039 | 9 | |a 202306131041 |b hainim |y 201302210927 |z hasniza | |
| 040 | |a MY-KlNDU |b eng |c MY-KlNDU |e rda | ||
| 050 | |a QA 76.9 |b .A25 .K79 2008 | ||
| 090 | |a QA76.9.A25 .K79 2008 | ||
| 100 | 1 | |a Krutz, Ronald L. |d 1938 |e author | |
| 245 | 1 | 0 | |a The CEH prep guide |b the comprehensive guide to certified ethical hacking |c Ronald L. Krutz, Russell Dean Vines |
| 246 | |a Comprehensive guide to certified ethical hacking | ||
| 246 | 3 | 0 | |a The CEH prep guide |h [electronic resource] |b the comprehensive guide to certified ethical hacking |
| 264 | 1 | |a Indianapolis, IN |b Wiley |c 2008 | |
| 264 | 4 | |a © 2008 | |
| 300 | |a xxviii, 738 pages |b illustrations |c 26 cm + |e 1 CD | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |r damedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 500 | |a Includes index | ||
| 505 | 0 | |a The business and legal issues of ethical hacking -- Introduction to hacking -- Ethics and legality -- Penetration testing for business -- The pre-attack phases -- Footprinting -- Scanning -- Enumerating -- Attack techniques and tools -- System hacking techniques -- Trojans, backdoors, and sniffers -- Denial of service attacks and session hijacking -- Penetration testing steps -- Linus hacking tools -- Social engineering and physical security -- Web server and database attacks -- Web server hacking and Web application vulnerabilities -- SQL injection vulnerabilities -- Cryptography -- Cracking Web passwords -- Advanced topics -- Wireless network attacks and countermeasures -- Firewalls, intrusion detection systems and honeypots -- Viruses, worms, and buffer overflows -- Answers to sample questions -- Glossary of terms and acronyms -- What's on the CD. | |
| 592 | |a IN/018058 |b 14/03/2023 |c RM 423.75 |h Innowawasan Sdn. Bhd | ||
| 650 | 0 | |a Computer security |x Testing |x Examinations |v Study guides | |
| 650 | 0 | |a Computer networks |x Security measures |x Examinations |v Study guides | |
| 650 | 0 | |a Computer networks |x Examinations |v Study guides | |
| 650 | 0 | |a Computer hackers | |
| 700 | 1 | |a Vines, Russell Dean |d 1952 | |
| 999 | |a vtls000048365 |c 94991 |d 94991 | ||


