现在的位置: 首页英文图书, 软件>正文
CEH Certified Ethical Hacker Study Guide
图书分类:英文图书, 软件 暂无评论 ⁄ 被围观 401 次阅读+

CEH Certified Ethical Hacker Study GuideBook Description:

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350

Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.

What’s Inside:
Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf

From the Back Cover
Prepare for CEH certification with this comprehensive guide

Learn how to identify security risks to networks and computers as you prepare for the Certified Ethical Hacker version 6 (CEHv6) exam. This in-depth guide thoroughly covers all exam objectives and topics, while showing you how Black Hat hackers think, helping you spot vulnerabilities in systems, and preparing you to beat the bad guys at their own game. Inside, you’ll find:
Full coverage of all exam objectives in a systematic approach, so you can be confident you’re getting the instruction you need for the exam
Practical hands-on exercises to reinforce critical skills
Real-world scenarios that put what you’ve learned in the context of actual job roles
Challenging review questions in each chapter to prepare you for exam day
Exam Essentials, a key feature in each chapter that identifies critical areas you must become proficient in before taking the exam
A handy tear card that maps every official exam objective to the corresponding chapter in the book, so you can track your exam prep objective by objective

Look inside for complete coverage of all exam objectives.

Table of Contents
Chapter 1. Introduction to Ethical Hacking, Ethics, and Legality
Chapter 2. Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering
Chapter 3. Gathering Network and Host Information: Scanning and Enumeration
Chapter 4. System Hacking: Password Cracking, Escalating Privileges, and Hiding Files
Chapter 5. Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms
Chapter 6. Gathering Data from Networks: Sniffers
Chapter 7. Denial of Service and Session Hijacking
Chapter 8. Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques
Chapter 9. Attacking Applications: SQL Injection and Buffer Overflows
Chapter 10. Wireless Network Hacking
Chapter 11. Physical Site Security
Chapter 12. Hacking Linux Systems
Chapter 13. Bypassing Network Security: Evading IDS, Honeypots, and Firewalls
Chapter 14. Understanding Cryptography
Chapter 15. Performing a Penetration Test

Book Details
Paperback: 432 pages
Publisher: Sybex (April 2010)
Language: English
ISBN-10: 0470525207
ISBN-13: 978-0470525203

标签:

你可能喜欢

1
说点什么

avatar
1 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
1 Comment authors
tosurer Recent comment authors
  Subscribe  
提醒
tosurer
成员
tosurer

不要当它是一本介绍“云计算”的书,作者通过介绍从过去到现在技术的进步对人类生活方式的改变,试图引出“云计算”或后“云计算”对于人类生活方式的影响。当然,在连“云计算”都尚属超前的时代,讨论后“云计算”生活显然有些空泛,这也是这本书最后两章有些牵强的原因。但整体上,这本书还是很不错的,他引人思考。特别是当网络作为一种生活方式不知不觉的融入我们日常的生活,当我们每天坐在电脑前面超过10个小时的时候,当我们在上下班的路上依然用手机上网的时候,这个社会在发生悄然的变化。由此而带来新的商机,新的改变,并由新的改变再成为人们的习惯,再发生下一次改变。正如书中所说,一种技术的进步,是需要两代人的时间。其中,包括对前一代人对于技术记忆的消除。

我建议特别是非IT专业的人士看本书,IT发展到今天,已经完全的成为了一种工具。应该更多的关注该怎样利用这资源。Taobao,开心农场,WiKi词典,Myspace,Youtube,这一系列的名词后面应该有更多对于IT应用的思考,及对我们,所在于这个充满创新和变革社会的人的自我反思。。。