Muutke küpsiste eelistusi

E-raamat: CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

  • Formaat: 464 pages
  • Ilmumisaeg: 16-Sep-2016
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781259836565
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 46,80 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 464 pages
  • Ilmumisaeg: 16-Sep-2016
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781259836565
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Fully up-to-date coverage of every topic on the CEH v9 certification exam

Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.

An integrated study system based on proven pedagogy, CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, features brand-new explanations of cloud computing and mobile platforms and addresses vulnerabilities to the latest technologies and operating systems. Readers will learn about footprinting and reconnaissance, malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and much more. Designed to help you pass the exam with ease, this authoritative resource will also serve as an essential on-the-job reference.

  • Features more than 400 accurate practice questions, including new performance-based questions
  • Electronic content includes 2 complete practice exams and a PDF copy of the book
  • Written by an experienced educator with more than 30 years of experience in the field
     
Acknowledgments xv
Introduction xvii
Chapter 1 Getting Started: Essential Knowledge 1(42)
Security 101
2(20)
Essentials
2(10)
Security Basics
12(10)
Introduction to Ethical Hacking
22(11)
Hacking Terminology
22(6)
The Ethical Hacker
28(5)
Review
33(10)
Questions
37(3)
Answers
40(3)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker 43(36)
Footprinting
44(4)
Passive Footprinting
46(2)
Active Footprinting
48(1)
Footprinting Methods and Tools
48(23)
Search Engines
49(6)
Website and E-mail Footprinting
55(3)
DNS Footprinting
58(9)
Network Footprinting
67(3)
Other Tools
70(1)
Review
71(8)
Questions
74(2)
Answers
76(3)
Chapter 3 Scanning and Enumeration 79(52)
Fundamentals
80(13)
TCP/IP Networking
80(9)
Subnetting
89(4)
Scanning Methodology
93(18)
Identifying Targets
94(3)
Port Scanning
97(9)
Evasion
106(3)
Vulnerability Scanning
109(2)
Enumeration
111(9)
Windows System Basics
112(2)
Enumeration Techniques
114(6)
Review
120(11)
Questions
125(3)
Answers
128(3)
Chapter 4 Sniffing and Evasion 131(46)
Essentials
132(12)
Network Knowledge for Sniffing
132(11)
Active and Passive Sniffing
143(1)
Sniffing Tools and Techniques
144(9)
Techniques
144(5)
Tools
149(4)
Evasion
153(14)
Devices Aligned Against You
153(8)
Evasion Techniques
161(6)
Review
167(10)
Questions
172(3)
Answers
175(2)
Chapter 5 Attacking a System 177(40)
Getting Started
178(15)
Windows Security Architecture
178(9)
Linux Security Architecture
187(4)
Methodology
191(2)
Hacking Steps
193(17)
Authentication and Passwords
193(7)
Privilege Escalation and Executing Applications
200(3)
Hiding Files and Covering Tracks
203(7)
Review
210(7)
Questions
213(3)
Answers
216(1)
Chapter 6 Web-Based Hacking: Servers and Applications 217(38)
Web Servers
218(16)
Web Organizations
218(4)
Attack Methodology
222(1)
Web Server Architecture
223(6)
Web Server Attacks
229(5)
Attacking Web Applications
234(12)
Application Attacks
235(11)
Countermeasures
246(1)
Review
246(9)
Questions
250(3)
Answers
253(2)
Chapter 7 Wireless Network Hacking 255(32)
Wireless Networking
256(16)
Wireless Terminology, Architecture, and Standards
256(8)
Wireless Hacking
264(8)
The Mobile World
272(7)
Mobile Platforms and Attacks
274(3)
Mobile Attacks
277(2)
Review
279(8)
Questions
283(2)
Answers
285(2)
Chapter 8 Security in Cloud Computing 287(18)
Cloud Computing
288(11)
Cloud Security
292(3)
Threats and Attacks
295(4)
Review
299(6)
Questions
302(2)
Answers
304(1)
Chapter 9 Trojans and Other Attacks 305(34)
The "Malware" Attacks
306(13)
Trojans
308(5)
Viruses and Worms
313(6)
Remaining Attacks
319(9)
Denial of Service
320(3)
Session Hijacking
323(5)
Review
328(11)
Questions
334(2)
Answers
336(3)
Chapter 10 Cryptography 101 339(40)
Cryptography and Encryption Overview
340(11)
Encryption Algorithms and Techniques
341(10)
PKI, the Digital Certificate, and Digital Signatures
351(8)
The PM System
352(3)
Digital Certificates
355(3)
Digital Signatures
358(1)
Encrypted Communication and Cryptography Attacks
359(11)
Encrypted Communication
362(6)
Cryptography Attacks
368(2)
Review
370(9)
Questions
373(4)
Answers
377(2)
Chapter 11 Low Tech: Social Engineering and Physical Security 379(30)
Social Engineering
380(16)
Human-Based Attacks
381(6)
Computer-Based Attacks
387(7)
Mobile-Based Attacks
394(2)
Physical Security
396(7)
Physical Security 101
396(7)
Review
403(6)
Questions
405(3)
Answers
408(1)
Chapter 12 The Pen Test: Putting It All Together 409(18)
Methodology and Steps
410(12)
The Security Assessments
411(8)
Security Assessment Deliverables
419(1)
Guidelines
420(1)
More Terminology
420(2)
Review
422(5)
Questions
424(2)
Answers
426(1)
Appendix A Tool, Sites, and References 427(22)
Vulnerability Research Sites
427(1)
Footprinting Tools
428(2)
People Search Tools
428(1)
Competitive Intelligence
428(1)
Tracking Online Reputation
428(1)
Website Research/Web Updates Tools
429(1)
DNS and Whois Tools
429(1)
Traceroute Tools and Links
429(1)
Website Mirroring Tools and Sites
430(1)
E-mail Tracking
430(1)
Google Hacking
430(1)
Scanning and Enumeration Tools
430(5)
Ping Sweep
430(1)
Scanning Tools
431(1)
Banner Grabbing
431(1)
Vulnerability Scanning
432(1)
Network Mapping
432(1)
Proxy, Anonymizer, and Tunneling
432(1)
Enumeration
433(1)
SNMP Enumeration
433(1)
LDAP Enumeration
434(1)
NTP Enumeration
434(1)
Registry Tools
434(1)
Windows Service Monitoring Tools
434(1)
File/Folder Integrity Checkers
434(1)
System Hacking Tools
435(4)
Default Password Search Links
435(1)
Password Hacking Tools
435(1)
DoS/DDos
435(1)
Sniffing
436(1)
Keyloggers and Screen Capture
436(1)
Privilege Escalation
436(1)
Executing Applications
437(1)
Spyware
437(1)
Mobile Spyware
437(1)
Covering Tracks
438(1)
Packet Crafting/Spoofing
438(1)
Session Hijacking
438(1)
Clearing Tracks
438(1)
Cryptography and Encryption
439(1)
Encryption Tools
439(1)
Hash Tools
439(1)
Steganography
439(1)
Stego Detection
440(1)
Cryptanalysis
440(1)
Sniffing
440(1)
Packet Capture
440(1)
Wireless
441(1)
MAC Flooding/Spoofing
441(1)
ARP Poisoning
441(1)
Wireless
441(3)
Discovery
441(1)
Attack and Analysis
441(1)
Packet Sniffing
442(1)
WEP/WPA Cracking
442(1)
Bluetooth
442(1)
Mobile Attacks
442(1)
Mobile Wireless Discovery
443(1)
Mobile Device Tracking
443(1)
Rooting/Jailbreaking
443(1)
MDM
443(1)
Trojans and Malware
444(1)
Anti-Malware (AntiSpyware and Anitvirus)
444(1)
Crypters and Packers
444(1)
Monitoring Tools
444(1)
Attack Tools
445(1)
Web Attacks
445(1)
Attack tools
445(1)
SQL Injection
446(1)
Miscellaneous
446(1)
Cloud Security
446(1)
IDS
446(1)
Evasion Tools
446(1)
Pen Test Suites
447(1)
VPN/FW Scanner
447(1)
Social Engineering
447(1)
Extras
447(1)
Linux Distributions
447(1)
Tools, Sites, and References Disclaimer
447(2)
Appendix B About the CD-ROM 449(2)
System Requirements
449(1)
Installing and Running Total Tester
449(1)
About Total Tester
449(1)
PDF Copy of the Book
450(1)
Technical Support
450(1)
Glossary 451(32)
Index 483
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).