CEH : official certified ethical hacker review guide / Kimberly Graves.
Material type: TextPublication details: Indianapolis, Ind. : Wiley Pub., c2007Description: xxii, 238 p. : ill. ; 23 cm. + 1 CD-ROM (4 3/4 in.)ISBN: 9780782144376 (pbk.)Other title: Certified ethical hackerSubject(s): Electronic data processing personnel -- Certification | Computer security -- Examinations -- Study guides | Computer hackers -- Examinations -- Study guides | Computer networks -- Examinations -- Study guidesDDC classification: 005.8 LOC classification: QA76.3 | .G73 2007Online resources: Publisher description | Table of contents only | Contributor biographical informationItem type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Staff Circulation | APIIT Library CD-ROM Shelf | CD-ROM | CD-35-59 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00034343 | |
General Circulation | APIIT Library CD-ROM Shelf | CD-ROM | CD-35-59A (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00034344 | |
Staff Circulation | APU Library Open Shelf | Book | QA76.3 .G73 2007 c.1 (Browse shelf (Opens below)) | 1 | Available (No use restrictions) | 00007214 | |
General Circulation | APU Library Open Shelf | Book | QA76.3 .G73 2007 c.2 (Browse shelf (Opens below)) | 2 | Available (No use restrictions) | 00007215 |
Browsing APIIT Library shelves, Shelving location: CD-ROM Shelf, Collection: CD-ROM Close shelf browser (Hides shelf browser)
CD-35-55 Microsoft Office Access 2007 inside out / | CD-35-56 Quantitative methods for business / | CD-35-57 Beginning dynamic websites with ASP.NET web matrix / | CD-35-59 CEH : | CD-35-59A CEH : | CD-35-60 Trusted platform module basics : | CD-35-61 CCNA security official exam certification guide / |
Includes index.
Introduction to ethical hacking, ethics, and legality -- Footprinting and social engineering -- Scanning and enumeration -- System hacking -- Trojans, backdoors, viruses, and worms -- Sniffers -- Denial of service and session hijacking -- Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques -- SQL injection and buffer overflows -- Wireless hacking -- Physical security -- Linux hacking -- Evading IDSs, honeypots, and firewalls -- Cryptography -- Penetration testing methodologies.
There are no comments on this title.