Muutke küpsiste eelistusi

E-raamat: CEH Certified Ethical Hacker Bundle, Third Edition

  • Formaat: EPUB+DRM
  • Ilmumisaeg: 27-Jan-2017
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781259837555
Teised raamatud teemal:
  • Formaat - EPUB+DRM
  • Hind: 56,16 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Ilmumisaeg: 27-Jan-2017
  • Kirjastus: McGraw-Hill Education
  • Keel: eng
  • ISBN-13: 9781259837555
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide

This thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam. CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, provides an in-depth review that covers 100% of the exam’s objectives. CEH Certified Ethical Hacker Practice Exams, Third Edition, tests and reinforces this coverage with 500+ realistic practice questions.

The CEH Certified Ethical Hacker Bundle, Third Edition, contains a bonus Quick Review Guide that can be used as the final piece for exam preparation. This content comes in addition to the electronic content included with the bundle’s component books. This new edition includes greater emphasis on cloud computing and mobile platforms and addresses new vulnerabilities to the latest technologies and operating systems.

  • In all, the bundle includes more than 1000 accurate questions with detailed answer explanations
  • Electronic content includes the Total Tester customizable exam engine, Quick Review Guide, and searchable PDF copies of both books
  • Readers will save 12% compared to buying the two books separately, and the bonus Quick Review Guide is available only with the bundle
Acknowledgments xv
Introduction xvii
Chapter 1 Getting Started: Essential Knowledge
1(42)
Security 101
2(20)
Essentials
2(10)
Security Basics
12(10)
Introduction to Ethical Hacking
22(11)
Hacking Terminology
22(6)
The Ethical Hacker
28(5)
Chapter Review
33(10)
Questions
37(3)
Answers
40(3)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
43(36)
Footprinting
44(4)
Passive Footprinting
46(2)
Active Footprinting
48(1)
Footprinting Methods and Tools
48(23)
Search Engines
49(6)
Website and E-mail Footprinting
55(3)
DNS Footprinting
58(9)
Network Footprinting
67(3)
Other Tools
70(1)
Chapter Review
71(8)
Questions
74(2)
Answers
76(3)
Chapter 3 Scanning and Enumeration
79(52)
Fundamentals
80(13)
TCP/IP Networking
80(9)
Subnetting
89(4)
Scanning Methodology
93(18)
Identifying Targets
94(3)
Port Scanning
97(9)
Evasion
106(3)
Vulnerability Scanning
109(2)
Enumeration
111(9)
Windows System Basics
112(2)
Enumeration Techniques
114(6)
Chapter Review
120(11)
Questions
125(3)
Answers
128(3)
Chapter 4 Sniffing and Evasion
131(46)
Essentials
132(12)
Network Knowledge for Sniffing
132(11)
Active and Passive Sniffing
143(1)
Sniffing Tools and Techniques
144(9)
Techniques
144(5)
Tools
149(4)
Evasion
153(14)
Devices Aligned Against You
153(8)
Evasion Techniques
161(6)
Chapter Review
167(10)
Questions
172(3)
Answers
175(2)
Chapter 5 Attacking a System
177(40)
Getting Started
178(15)
Windows Security Architecture
178(9)
Linux Security Architecture
187(4)
Methodology
191(2)
Hacking Steps
193(17)
Authentication and Passwords
193(7)
Privilege Escalation and Executing Applications
200(3)
Hiding Files and Covering Tracks
203(7)
Chapter Review
210(7)
Questions
213(3)
Answers
216(1)
Chapter 6 Web-Based Hacking: Servers and Applications
217(38)
Web Servers
218(16)
Web Organizations
218(4)
Attack Methodology
222(1)
Web Server Architecture
223(6)
Web Server Attacks
229(5)
Attacking Web Applications
234(12)
Application Attacks
235(11)
Countermeasures
246(1)
Chapter Review
246(9)
Questions
250(3)
Answers
253(2)
Chapter 7 Wireless Network Hacking
255(32)
Wireless Networking
256(16)
Wireless Terminology, Architecture, and Standards
256(8)
Wireless Hacking
264(8)
The Mobile World
272(7)
Mobile Platforms and Attacks
274(3)
Mobile Attacks
277(2)
Chapter Review
279(8)
Questions
283(2)
Answers
285(2)
Chapter 8 Security in Cloud Computing
287(18)
Cloud Computing
288(11)
Cloud Security
292(3)
Threats and Attacks
295(4)
Chapter Review
299(6)
Questions
302(2)
Answers
304(1)
Chapter 9 Trojans and Other Attacks
305(34)
The "Malware" Attacks
306(13)
Trojans
308(5)
Viruses and Worms
313(6)
Remaining Attacks
319(9)
Denial of Service
320(3)
Session Hijacking
323(5)
Chapter Review
328(11)
Questions
334(2)
Answers
336(3)
Chapter 10 Cryptography 101
339(40)
Cryptography and Encryption Overview
340(11)
Encryption Algorithms and Techniques
341(10)
PKI, the Digital Certificate, and Digital Signatures
351(8)
The PKI System
352(3)
Digital Certificates
355(3)
Digital Signatures
358(1)
Encrypted Communication and Cryptography Attacks
359(11)
Encrypted Communication
362(6)
Cryptography Attacks
368(2)
Chapter Review
370(9)
Questions
373(4)
Answers
377(2)
Chapter 11 Low Tech: Social Engineering and Physical Security
379(30)
Social Engineering
380(16)
Human-Based Attacks
381(6)
Computer-Based Attacks
387(7)
Mobile-Based Attacks
394(2)
Physical Security
396(7)
Physical Security 101
396(7)
Chapter Review
403(6)
Questions
405(3)
Answers
408(1)
Chapter 12 The Pen Test: Putting It All Together
409(18)
Methodology and Steps
410(12)
The Security Assessments
411(8)
Security Assessment Deliverables
419(1)
Guidelines
420(1)
More Terminology
420(2)
Chapter Review
422(5)
Questions
424(2)
Answers
426(1)
Appendix A Tool, Sites, and References
427(22)
Vulnerability Research Sites
427(1)
Footprinting Tools
428(2)
People Search Tools
428(1)
Competitive Intelligence
428(1)
Tracking Online Reputation
428(1)
Website Research/Web Updates Tools
429(1)
DNS and Whois Tools
429(1)
Traceroute Tools and Links
429(1)
Website Mirroring Tools and Sites
430(1)
E-mail Tracking
430(1)
Google Hacking
430(1)
Scanning and Enumeration Tools
430(5)
Ping Sweep
430(1)
Scanning Tools
431(1)
Banner Grabbing
431(1)
Vulnerability Scanning
432(1)
Network Mapping
432(1)
Proxy, Anonymizer, and Tunneling
432(1)
Enumeration
433(1)
SNMP Enumeration
433(1)
LDAP Enumeration
434(1)
NTP Enumeration
434(1)
Registry Tools
434(1)
Windows Service Monitoring Tools
434(1)
File/Folder Integrity Checkers
434(1)
System Hacking Tools
435(4)
Default Password Search Links
435(1)
Password Hacking Tools
435(1)
DoS/DDos
435(1)
Sniffing
436(1)
Keyloggers and Screen Capture
436(1)
Privilege Escalation
436(1)
Executing Applications
437(1)
Spyware
437(1)
Mobile Spyware
437(1)
Covering Tracks
438(1)
Packet Crafting/Spoofing
438(1)
Session Hijacking
438(1)
Clearing Tracks
438(1)
Cryptography and Encryption
439(1)
Encryption Tools
439(1)
Hash Tools
439(1)
Steganography
439(1)
Stego Detection
440(1)
Cryptanalysis
440(1)
Sniffing
440(1)
Packet Capture
440(1)
Wireless
441(1)
MAC Flooding/Spoofing
441(1)
ARP Poisoning
441(1)
Wireless
441(3)
Discovery
441(1)
Attack and Analysis
441(1)
Packet Sniffing
442(1)
WEP/WPA Cracking
442(1)
Bluetooth
442(1)
Mobile Attacks
442(1)
Mobile Wireless Discovery
443(1)
Mobile Device Tracking
443(1)
Rooting/Jailbreaking
443(1)
MDM
443(1)
Trojans and Malware
444(1)
Anti-Malware (AntiSpyware and Anitvirus)
444(1)
Crypters and Packers
444(1)
Monitoring Tools
444(1)
Attack Tools
445(1)
Web Attacks
445(1)
Attack tools
445(1)
SQL Injection
446(1)
Miscellaneous
446(1)
Cloud Security
446(1)
IDS
446(1)
Evasion Tools
446(1)
Pen Test Suites
447(1)
VPN/FW Scanner
447(1)
Social Engineering
447(1)
Extras
447(1)
Linux Distributions
447(1)
Tools, Sites, and References Disclaimer
447(2)
Appendix B About the CD-ROM
449(2)
System Requirements
449(1)
Installing and Running Total Tester
449(1)
About Total Tester
449(1)
PDF Copy of the Book
450(1)
Technical Support
450(1)
Glossary 451(32)
Index 483
Acknowledgments vi
Introduction vii
Chapter 1 Getting Started: Essential Knowledge
1(28)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
29(28)
Chapter 3 Scanning and Enumeration
57(26)
Chapter 4 Sniffing and Evasion
83(26)
Chapter 5 Attacking a System
109(28)
Chapter 6 Web-Based Hacking: Servers and Applications
137(28)
Chapter 7 Wireless Network Hacking
165(24)
Chapter 8 Security in Cloud Computing
189(20)
Chapter 9 Trojans and Other Attacks
209(26)
Chapter 10 Cryptography 101
235(26)
Chapter 11 Low Tech: Social Engineering and Physical Security
261(26)
Chapter 12 The Pen Test: Putting It All Together
287(24)
Appendix A Pre-assessment Test 311(28)
Appendix B About the CD-ROM 339
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).