CEH : official certified ethical hacker review guide
Main Author: | |
---|---|
Format: | Book |
Language: | English |
Published: |
Indianapolis, Ind.:
Wiley Pub.,
2007.
|
Subjects: |
Table of Contents:
- Introduction to ethical hacking, ethics, and legality
- Footprinting and social engineering
- Scanning and enumeration
- System hacking
- Trojans, backdoors, viruses, and worms
- Sniffers
- Denial of service and session hijacking
- Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques
- SQL injection and buffer overflows
- Wireless hacking
- Physical security
- Linux hacking
- Evading IDSs, honeypots, and firewalls
- Cryptography
- Penetration testing methodologies