買這商品的人也買了...
-
$2,450$2,328 -
$1,080Windows System Programming, 3/e (Hardcover)
-
$290$261 -
$880$695 -
$2,800$2,660 -
$1,080CMMI: Guidelines for Process Integration and Product Improvement, 2/e
-
$780$663 -
$990LPI Linux Certification in a Nutshell, 2/e (Paperback)
-
$825JavaScript Bible, 6/e (Paperback)
-
$990$891 -
$650$553 -
$600$480 -
$720$612 -
$650$585 -
$299The Art of Agile Development (Paperback)
-
$1,235The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
-
$1,638Cross-Platform Development in C++: Building Mac OS X, Linux, and Windows Applications (Paperback)
-
$670$529 -
$680$537 -
$490$417 -
$620$527 -
$780$616 -
$520$442 -
$820$648 -
$580$493
商品描述
Description
- The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
- Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
- Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
- Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
Table of Contents
Introduction.The Business and Legal Issues of Ethical Hacking.
Introduction to Hacking.
Ethics and Legality.
Penetration Testing for Business.
The Pre-Attack Phases.
Footprinting.
Scanning.
Enumerating.
Attack Techniques and Tools.
System Hacking Techniques.
Trojans, Backdoors and Sniffers.
Denial of Service Attacks and Session Hijacking.
Penetration Testing Steps.
Linux Hacking Tools.
Social Engineering and Physical Security.
Web Server and Database Attacks.
Web Server Hacking and Web Application Vulnerabilities.
SQL Injection Vulnerabilities.
Cryptography.
Cracking Web Passwords.
Advanced Topics.
Wireless Network Attacks and Countermeasures.
Firewalls, Intrusion Detection Systems and Honeypots.
Viruses, Worms and Buffer Overflows.
Answers to Sample Questions.
Glossary of Terms and Acronyms.
What's on the CD.
Index.