Asia Pacific University Library catalogue


CEH : official certified ethical hacker review guide / Kimberly Graves.

By: Graves, Kimberly, 1974-Material type: TextTextPublication details: Indianapolis, Ind. : Wiley Pub., c2007Description: xxii, 238 p. : ill. ; 23 cm. + 1 CD-ROM (4 3/4 in.)ISBN: 9780782144376 (pbk.)Other title: Certified ethical hackerSubject(s): Electronic data processing personnel -- Certification | Computer security -- Examinations -- Study guides | Computer hackers -- Examinations -- Study guides | Computer networks -- Examinations -- Study guidesDDC classification: 005.8 LOC classification: QA76.3 | .G73 2007Online resources: Publisher description | Table of contents only | Contributor biographical information
Contents:
Introduction to ethical hacking, ethics, and legality -- Footprinting and social engineering -- Scanning and enumeration -- System hacking -- Trojans, backdoors, viruses, and worms -- Sniffers -- Denial of service and session hijacking -- Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques -- SQL injection and buffer overflows -- Wireless hacking -- Physical security -- Linux hacking -- Evading IDSs, honeypots, and firewalls -- Cryptography -- Penetration testing methodologies.
    Average rating: 0.0 (0 votes)
Item type Current library Collection Call number Copy number Status Date due Barcode
Staff Circulation Staff Circulation APIIT Library
CD-ROM Shelf
CD-ROM CD-35-59 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00034343
General Circulation General Circulation APIIT Library
CD-ROM Shelf
CD-ROM CD-35-59A (Browse shelf (Opens below)) 2 Available (No use restrictions) 00034344
Staff Circulation Staff Circulation APU Library
Open Shelf
Book QA76.3 .G73 2007 c.1 (Browse shelf (Opens below)) 1 Available (No use restrictions) 00007214
General Circulation General Circulation APU Library
Open Shelf
Book QA76.3 .G73 2007 c.2 (Browse shelf (Opens below)) 2 Available (No use restrictions) 00007215

Includes index.

Introduction to ethical hacking, ethics, and legality -- Footprinting and social engineering -- Scanning and enumeration -- System hacking -- Trojans, backdoors, viruses, and worms -- Sniffers -- Denial of service and session hijacking -- Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques -- SQL injection and buffer overflows -- Wireless hacking -- Physical security -- Linux hacking -- Evading IDSs, honeypots, and firewalls -- Cryptography -- Penetration testing methodologies.

There are no comments on this title.

to post a comment.