CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50 (Paperback)
暫譯: CEH:官方認證倫理駭客考試複習指南:考試 312-50(平裝本)

Kimberly Graves

  • 出版商: Sybex
  • 出版日期: 2007-02-27
  • 售價: $1,300
  • 貴賓價: 9.5$1,235
  • 語言: 英文
  • 頁數: 264
  • 裝訂: Paperback
  • ISBN: 0782144373
  • ISBN-13: 9780782144376
  • 相關分類: 駭客 Hack
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

商品描述

Description

  • The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications.
  • This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
  • Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
  • The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Council's CEH training.

 

 
Table of Contents
 
Introduction.

Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality.

Chapter 2: Footprinting and Social Engineering.

Chapter 3: Scanning and Enumeration.

Chapter 4: System Hacking.

Chapter 5: Trojans, Backdoors, Viruses, and Worms.

Chapter 6: Sniffers.

Chapter 7: Denial of Service and Session Hijacking.

Chapter 8: Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.

Chapter 9: SQL Injection and Buffer Overflows.

Chapter 10: Wireless Hacking.

Chapter 11: Physical Security.

Chapter 12: Linux Hacking.

Chapter 13: Evading IDSs, Honeypots, and Firewalls.

Chapter 14: Cryptography.

Chapter 15: Penetration Testing Methodologies.

Glossary.

Index.

商品描述(中文翻譯)

**描述**

- EC-Council 的認證倫理駭客已成為當今最受歡迎的認證之一。
- 這是唯一的官方考試複習指南,涵蓋所有 CEH 考試目標,從倫理和測試到保護有線和無線網路。
- 本書由行業專家 Kimberly Graves 撰寫,這本簡明且專注的指南非常適合已參加 CEH 課程並需要最後一刻複習的人。
- CD-ROM 附帶兩個額外考試、150 道閃卡問題、一個可搜尋的關鍵術語詞彙表,以及在 EC-Council 的 CEH 訓練中使用的駭客工具。

**目錄**

- 介紹
- 第 1 章:倫理駭客、倫理與合法性介紹
- 第 2 章:足跡分析與社會工程
- 第 3 章:掃描與列舉
- 第 4 章:系統駭客
- 第 5 章:木馬、後門、病毒與蠕蟲
- 第 6 章:嗅探器
- 第 7 章:拒絕服務與會話劫持
- 第 8 章:駭客網路伺服器、網路應用程式漏洞與基於網路的密碼破解技術
- 第 9 章:SQL 注入與緩衝區溢位
- 第 10 章:無線駭客
- 第 11 章:物理安全
- 第 12 章:Linux 駭客
- 第 13 章:迴避 IDS、蜜罐與防火牆
- 第 14 章:密碼學
- 第 15 章:滲透測試方法論
- 詞彙表
- 索引

最後瀏覽商品 (20)