Nicht aus der Schweiz? Besuchen Sie lehmanns.de
The CEH Prep Guide - Ronald L. Krutz, Russell Dean Vines

The CEH Prep Guide

The Comprehensive Guide to Certified Ethical Hacking
Buch | Hardcover
768 Seiten
2007
John Wiley & Sons Ltd (Verlag)
978-0-470-13592-1 (ISBN)
CHF 71,75 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
A guide for keeping networks safe with the Certified Ethical Hacker program.
* The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope * Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more * Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking * Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests

RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series. RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE, MCNE, is Chief Security Advisor for Gotham Technology Group, LLC. He is the author or coauthor of numerous bestselling information system security publications, and is a consulting editor for John Wiley and Sons for its information security book series.

Foreword. Acknowledgments. Introduction. Part I: The Business and Legal Issues of Ethical Hacking. Chapter 1: Introduction to Ethical Hacking. Chapter 2: Legality and Ethics. Chapter 3: Penetration Testing for Business. Part II: The Pre-Attack Phases. Chapter 4: Footprinting. Chapter 5: Scanning. Chapter 6: Enumerating. Part III: Attack Techniques and Tools. Chapter 7: System Hacking Techniques. Chapter 8: Trojans, Backdoors, and Sniffers. Chapter 9: Denial of Service Attacks and Session Hijacking. Chapter 10: Penetration Testing Steps. Chapter 11: Linux Hacking Tools. Chapter 12: Social Engineering and Physical Security. Part IV: Web Server and Database Attacks. Chapter 13: Web Server Hacking and Web Application Vulnerabilities. Chapter 14: SQL Injection Vulnerabilities. Chapter 15: Cryptography. Chapter 16: Cracking Web Passwords. Part V: Advanced Topics. Chapter 17: Wireless Network Attacks and Countermeasures. Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots. Chapter 19: Viruses, Worms, and Buffer Overflows. Appendix A: Answers to Assessment Questions. Appendix B: Glossary of Terms and Acronyms. Appendix C: What's on the CD. Index.

Erscheint lt. Verlag 19.10.2007
Verlagsort Chichester
Sprache englisch
Maße 194 x 241 mm
Gewicht 1330 g
Einbandart gebunden
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 0-470-13592-1 / 0470135921
ISBN-13 978-0-470-13592-1 / 9780470135921
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
CHF 97,95

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
CHF 39,20