- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
* The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope * Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more * Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking * Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
Contents
Foreword. Acknowledgments. Introduction. Part IIssues of Ethical Hacking. Chapter 1: Introduction to Ethical Hacking. Chapter 2: Legality and Ethics. Chapter 3: Penetration Testing for Business. Part II: The Pre-Attack Phases. Chapter 4: Footprinting. Chapter 5: Scanning. Chapter 6: Enumerating. Part III: Attack Techniques and Tools. Chapter 7: System Hacking Techniques. Chapter 8: Trojans, Backdoors, and Sniffers. Chapter 9: Denial of Service Attacks and Session Hijacking. Chapter 10: Penetration Testing Steps. Chapter 11: Linux Hacking Tools. Chapter 12: Social Engineering and Physical Security. Part IV: Web Server and Database Attacks. Chapter 13: Web Server Hacking and Web Application Vulnerabilities. Chapter 14: SQL Injection Vulnerabilities. Chapter 15: Cryptography. Chapter 16: Cracking Web Passwords. Part V: Advanced Topics. Chapter 17: Wireless Network Attacks and Countermeasures. Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots. Chapter 19: Viruses, Worms, and Buffer Overflows. Appendix A: Answers to Assessment Questions. Appendix B: Glossary of Terms and Acronyms. Appendix C: What's on the CD. Index.