The CEH prep guide the comprehensive guide to certified ethical hacking
Saved in:
| Main Author: | |
|---|---|
| Other Authors: | |
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
Wiley
2008
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Call Number : | QA 76.9 .A25 .K79 2008 |
Table of Contents:
- The business and legal issues of ethical hacking
- Introduction to hacking
- Ethics and legality
- Penetration testing for business
- The pre-attack phases
- Footprinting
- Scanning
- Enumerating
- Attack techniques and tools
- System hacking techniques
- Trojans, backdoors, and sniffers
- Denial of service attacks and session hijacking
- Penetration testing steps
- Linus hacking tools
- Social engineering and physical security
- Web server and database attacks
- Web server hacking and Web application vulnerabilities
- SQL injection vulnerabilities
- Cryptography
- Cracking Web passwords
- Advanced topics
- Wireless network attacks and countermeasures
- Firewalls, intrusion detection systems and honeypots
- Viruses, worms, and buffer overflows
- Answers to sample questions
- Glossary of terms and acronyms
- What's on the CD.


