買這商品的人也買了...
-
$480$379 -
$375Security+ Exam Cram 2 Lab Manual (Paperback)
-
$720$706 -
$350$277 -
$880$695 -
$399CISSP All-in-One Exam Guide, 3/e
-
$650$514 -
$1,140$1,029 -
$650$507 -
$550$435 -
$270$213 -
$690$587 -
$420$399 -
$480$408 -
$350$277 -
$880$695 -
$620$490 -
$750$593 -
$990Security+ Study Guide, 2/e (Paperback)
-
$550$435 -
$700$686 -
$600$480 -
$650$514 -
$1,400$1,330 -
$420$332
商品描述
Description
- The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications.
- This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
- Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
- The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Council's CEH training.
Introduction.Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 2: Footprinting and Social Engineering.
Chapter 3: Scanning and Enumeration.
Chapter 4: System Hacking.
Chapter 5: Trojans, Backdoors, Viruses, and Worms.
Chapter 6: Sniffers.
Chapter 7: Denial of Service and Session Hijacking.
Chapter 8: Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
Chapter 9: SQL Injection and Buffer Overflows.
Chapter 10: Wireless Hacking.
Chapter 11: Physical Security.
Chapter 12: Linux Hacking.
Chapter 13: Evading IDSs, Honeypots, and Firewalls.
Chapter 14: Cryptography.
Chapter 15: Penetration Testing Methodologies.
Glossary.
Index.
商品描述(中文翻譯)
**描述**
- EC-Council 的認證倫理駭客已成為當今最受歡迎的認證之一。
- 這是唯一的官方考試複習指南,涵蓋所有 CEH 考試目標,從倫理和測試到保護有線和無線網路。
- 本書由行業專家 Kimberly Graves 撰寫,這本簡明且專注的指南非常適合已參加 CEH 課程並需要最後一刻複習的人。
- CD-ROM 附帶兩個額外考試、150 道閃卡問題、一個可搜尋的關鍵術語詞彙表,以及在 EC-Council 的 CEH 訓練中使用的駭客工具。
**目錄**
- 介紹
- 第 1 章:倫理駭客、倫理與合法性介紹
- 第 2 章:足跡分析與社會工程
- 第 3 章:掃描與列舉
- 第 4 章:系統駭客
- 第 5 章:木馬、後門、病毒與蠕蟲
- 第 6 章:嗅探器
- 第 7 章:拒絕服務與會話劫持
- 第 8 章:駭客網路伺服器、網路應用程式漏洞與基於網路的密碼破解技術
- 第 9 章:SQL 注入與緩衝區溢位
- 第 10 章:無線駭客
- 第 11 章:物理安全
- 第 12 章:Linux 駭客
- 第 13 章:迴避 IDS、蜜罐與防火牆
- 第 14 章:密碼學
- 第 15 章:滲透測試方法論
- 詞彙表
- 索引