買這商品的人也買了...
-
$480$379 -
$375Security+ Exam Cram 2 Lab Manual (Paperback)
-
$720$706 -
$350$277 -
$880$695 -
$399CISSP All-in-One Exam Guide, 3/e
-
$650$514 -
$1,140$1,029 -
$650$507 -
$550$468 -
$270$213 -
$690$587 -
$420$399 -
$480$408 -
$350$277 -
$880$616 -
$620$527 -
$750$593 -
$990Security+ Study Guide, 2/e (Paperback)
-
$550$435 -
$700$686 -
$600$480 -
$650$553 -
$1,400$1,330 -
$420$357
相關主題
商品描述
Description
- The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications.
- This is the only official review guide to the test, covering all CEH exam objectives, from ethics and testing to securing wired and wireless networks.
- Written industry expert Kimberly Graves, this concise, focused guide is ideal for people who have taken CEH classes and need a last-minute review.
- The CD-ROM features two bonus exams, 150 flashcard questions, a searchable glossary of key terms, and hacking tools used in the EC-Council's CEH training.
Introduction.Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality.
Chapter 2: Footprinting and Social Engineering.
Chapter 3: Scanning and Enumeration.
Chapter 4: System Hacking.
Chapter 5: Trojans, Backdoors, Viruses, and Worms.
Chapter 6: Sniffers.
Chapter 7: Denial of Service and Session Hijacking.
Chapter 8: Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
Chapter 9: SQL Injection and Buffer Overflows.
Chapter 10: Wireless Hacking.
Chapter 11: Physical Security.
Chapter 12: Linux Hacking.
Chapter 13: Evading IDSs, Honeypots, and Firewalls.
Chapter 14: Cryptography.
Chapter 15: Penetration Testing Methodologies.
Glossary.
Index.
商品描述(中文翻譯)
描述
EC-Council的Certified Ethical Hacker已成為當今最受追捧的認證之一。
這是唯一的官方考試指南,涵蓋了所有CEH考試目標,從倫理和測試到保護有線和無線網絡。
由行業專家Kimberly Graves撰寫,這本簡明而專注的指南非常適合已經參加CEH課程並需要最後一刻複習的人。
CD-ROM附帶兩個額外的考試、150個閃卡問題、可搜索的關鍵詞詞彙表以及EC-Council的CEH培訓中使用的黑客工具。
目錄
介紹。
第1章:入門到道德黑客、倫理和合法性。
第2章:足跡和社交工程。
第3章:掃描和枚舉。
第4章:系統入侵。
第5章:特洛伊木馬、後門、病毒和蠕蟲。
第6章:嗅探器。
第7章:拒絕服務和會話劫持。
第8章:黑客攻擊網絡伺服器、網絡應用漏洞和基於網絡的密碼破解技術。
第9章:SQL注入和緩衝區溢出。
第10章:無線網絡入侵。
第11章:物理安全。
第12章:Linux黑客。
第13章:規避入侵檢測系統、誘餌系統和防火牆。
第14章:加密學。
第15章:滲透測試方法論。
詞彙表。
索引。