The CEH prep guide the comprehensive guide to certified ethical hacking

Saved in:
Bibliographic Details
Main Author: Krutz, Ronald L. 1938 (Author)
Other Authors: Vines, Russell Dean 1952
Format: Book
Language:English
Published: Indianapolis, IN Wiley 2008
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • The business and legal issues of ethical hacking
  • Introduction to hacking
  • Ethics and legality
  • Penetration testing for business
  • The pre-attack phases
  • Footprinting
  • Scanning
  • Enumerating
  • Attack techniques and tools
  • System hacking techniques
  • Trojans, backdoors, and sniffers
  • Denial of service attacks and session hijacking
  • Penetration testing steps
  • Linus hacking tools
  • Social engineering and physical security
  • Web server and database attacks
  • Web server hacking and Web application vulnerabilities
  • SQL injection vulnerabilities
  • Cryptography
  • Cracking Web passwords
  • Advanced topics
  • Wireless network attacks and countermeasures
  • Firewalls, intrusion detection systems and honeypots
  • Viruses, worms, and buffer overflows
  • Answers to sample questions
  • Glossary of terms and acronyms
  • What's on the CD.