CEH : official certified ethical hacker review guide / Kimberly Graves

By: Graves, KimberlyPublisher: Indianapolis, Ind. : Wiley Pub., c2007Description: xxii, 238 p. : ill. ; 23 cm. + 1 CD-ROM (4 3/4 in.)ISBN: 0782144373 (pbk./cd-rom); 9780782144376 (pbk./cd-rom)Other title: Certified ethical hackerSubject(s): Computer hackers -- Examinations | Computer networks -- Examinations | Computer security -- Examinations | Electronic data processing personnel -- CertificationDDC classification: 005.8,GRA Online resources: Contributor biographical information | Publisher description | Table of contents only
Contents:
Introduction to ethical hacking, ethics, and legality (Page-1), Footprinting and social engineering (Page-19), Scanning and enumeration (Page-41), System hacking (Page-67), Trojans, backdoors, viruses, and worms (Page-91), Sniffers (Page-107), Denial of service and session hijacking (Page-119), Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques (Page-137), SQL injection and buffer overflows (Page-151), Wireless hacking (Page-159), Physical security (Page-169), Linux hacking (Page-177), Evading IDSs, honeypots, and firewalls (Page-187), Cryptography (Page-195), Penetration testing methodologies (Page-203).
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Home library Shelving location Call number URL Status Notes Date due Barcode Item holds
Book Book Military College of Signals (MCS)
Military College of Signals (MCS)
General Stacks 005.8,GRA (Browse shelf) Link to resource Available Almirah No.9, Shelf No.1 MCS34757
Total holds: 0

Introduction to ethical hacking, ethics, and legality (Page-1), Footprinting and social engineering (Page-19), Scanning and enumeration (Page-41), System hacking (Page-67), Trojans, backdoors, viruses, and worms (Page-91), Sniffers (Page-107), Denial of service and session hijacking (Page-119), Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques (Page-137), SQL injection and buffer overflows (Page-151), Wireless hacking (Page-159), Physical security (Page-169), Linux hacking (Page-177), Evading IDSs, honeypots, and firewalls (Page-187), Cryptography (Page-195), Penetration testing methodologies (Page-203).

There are no comments on this title.

to post a comment.
© 2023 Central Library, National University of Sciences and Technology. All Rights Reserved.