
CEH 备考指南The CEHTM Prep Guide
副标题:无
分类号:
ISBN:9780470135921
微信扫一扫,移动浏览光盘
简介
作者简介: RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series.
目录
Foreword.
Acknowledgments.
Introduction.
Part I: The Business and Legal Issues of Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Legality and Ethics.
Chapter 3: Penetration Testing for Business.
Part II: The Pre-Attack Phases.
Chapter 4: Footprinting.
Chapter 5: Scanning.
Chapter 6: Enumerating.
Part III: Attack Techniques and Tools.
Chapter 7: System Hacking Techniques.
Chapter 8: Trojans, Backdoors, and Sniffers.
Chapter 9: Denial of Service Attacks and Session Hijacking.
Chapter 10: Penetration Testing Steps.
Chapter 11: Linux Hacking Tools.
Chapter 12: Social Engineering and Physical Security.
Part IV: Web Server and Database Attacks.
Chapter 13: Web Server Hacking and Web Application Vulnerabilities.
Chapter 14: SQL Injection Vulnerabilities.
Chapter 15: Cryptography.
Chapter 16: Cracking Web Passwords.
Part V: Advanced Topics.
Chapter 17: Wireless Network Attacks and Countermeasures.
Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots.
Chapter 19: Viruses, Worms, and Buffer Overflows.
Appendix A: Answers to Assessment Questions.
Appendix B: Glossary of Terms and Acronyms.
Appendix C: What’s on the CD.
Index.
Acknowledgments.
Introduction.
Part I: The Business and Legal Issues of Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Legality and Ethics.
Chapter 3: Penetration Testing for Business.
Part II: The Pre-Attack Phases.
Chapter 4: Footprinting.
Chapter 5: Scanning.
Chapter 6: Enumerating.
Part III: Attack Techniques and Tools.
Chapter 7: System Hacking Techniques.
Chapter 8: Trojans, Backdoors, and Sniffers.
Chapter 9: Denial of Service Attacks and Session Hijacking.
Chapter 10: Penetration Testing Steps.
Chapter 11: Linux Hacking Tools.
Chapter 12: Social Engineering and Physical Security.
Part IV: Web Server and Database Attacks.
Chapter 13: Web Server Hacking and Web Application Vulnerabilities.
Chapter 14: SQL Injection Vulnerabilities.
Chapter 15: Cryptography.
Chapter 16: Cracking Web Passwords.
Part V: Advanced Topics.
Chapter 17: Wireless Network Attacks and Countermeasures.
Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots.
Chapter 19: Viruses, Worms, and Buffer Overflows.
Appendix A: Answers to Assessment Questions.
Appendix B: Glossary of Terms and Acronyms.
Appendix C: What’s on the CD.
Index.
CEH 备考指南The CEHTM Prep Guide
- 名称
- 类型
- 大小
光盘服务联系方式: 020-38250260 客服QQ:4006604884
云图客服:
用户发送的提问,这种方式就需要有位在线客服来回答用户的问题,这种 就属于对话式的,问题是这种提问是否需要用户登录才能提问
Video Player
×
Audio Player
×
pdf Player
×
