TOP
0
0
【13悅讀日】4/13~4/17 消費滿699送100元E-coupon
CEH: CERTIFIED ETHICAL HACKER STUDY GUIDE W/ CD
滿額折

CEH: CERTIFIED ETHICAL HACKER STUDY GUIDE W/ CD

定  價:NT$ 1748 元
優惠價:901573
領券後再享88折
無庫存,下單後進貨(到貨天數約30-45天)
可得紅利積點:47 點
相關商品
商品簡介
作者簡介
目次

商品簡介

Prepare for the new version of CEH certification with this advanced guide
Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice.
Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more
Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts
Includes a CD with review questions, bonus exams, and more study tools
This is the ideal guide to prepare you for the new CEH certification exam.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

作者簡介

Kimberly Graves, CEH, CWSP, CWNP, CWNA, has over 15 years of IT experience. She is founder of Techsource Network Solutions, a network and security consulting organization located in the Washington, DC area. She has served as subject matter expert for several certification programs-including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer programs-and has developed course materials for the Department of Veteran Affairs, USAF, and the NSA.

目次

1 Introduction to Ethical Hacking, Ethics, and Legality.
2 Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering.
3 Gathering Network and Host Information: Scanning and Enumeration.
4 System Hacking: Password Cracking, Escalating Privileges, and Hiding Files.
5 Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms.
6 Gathering Data from Networks: Sniffers.
7 Denial of Service and Session Hijacking.
8 Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques.
9 Attacking Applications: SQL Injection and Buffer Overflows.
10 Wireless Network Hacking.
11 Physical Site Security.
12 Hacking Linux Systems.
13 Bypassing Network Security: Evading IDS, Honeypots, and Firewalls.
14 Understanding Cryptography.
15 Performing a Penetration Test.

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

優惠價:90 1573
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區