McGraw-Hill Digital
Libro ebook CEH Certified Ethical Hacker All-in-One Exam Guide, Matt Walker
Author: Matt Walker
Publisher: McGraw-Hill Digital
Categories: Web services
Language: Inglés
Price in book ePub
: 44.21 (44.21)
ePub with Adobe DRM
Publishing year: 2011
Pages 368
Size: 5.22 Mb
Copy No
Printing No
ISBN: 9780071772297
FAVORITE Uncheck
BOOK DESCRIPTION
INDEX
COMMENTS

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.

COVERS ALL EXAM TOPICS, INCLUDING:

•Introduction to ethical hacking
•Cryptography
•Reconnaissance and footprinting
•Network scanning
•Enumeration
•System hacking
•Evasion techniques
•Social engineering and physical security
•Hacking web servers and applications
•SQL injection
•Viruses, trojans, and other attacks
•Wireless hacking
•Penetration testing

CD-ROM FEATURES:

•Two practice exams
•PDF copy of the book
•Bonus appendix with author's recommended tools, sites, and references

Matt Walker, CEHv7, CPTS, CNDA, CCNA, MCSE, has held a wide variety of IT security teaching, writing, and leadership roles, including director of the Network Training Center on Ramstein AB, Germany, and IT security manager for Lockheed Martin at Kennedy Space Center. He is currently a security engineer for Hewlett-Packard.

Chapter 1. Ethical Hacking Basics
Chapter 2. Cryptography 101
Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 4. Scanning and Enumeration
Chapter 5. Hacking Through the Network: Sniffers and Evasion
Chapter 6. Attacking a System
Chapter 7. Low Tech: Social Engineering and Physical Security
Chapter 8. Web-Based Hacking: Servers and Applications
Chapter 9. Wireless Network Hacking
Chapter 10. Trojans and Other Attacks
Chapter 11. The Pen Test: Putting It All Together
Appendix A. Tool, Sites, and ReferencesAppendix B. About the CD
Glossary
Index
Comments about the book
Your rating:
Rating:
Comment:
To participate you need to be registered from here
 


1/3/2012 7:11:48 PM


1/3/2012 7:11:47 PM
Privacity | Terms website use | CONTACT
2000-2019 © Powered by Global Content Manager