|
![]() |
|||
|
||||
OverviewGet complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL EXAM TOPICS, INCLUDING: Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses, trojans, and other attacksWireless hackingPenetration testing CD-ROM FEATURES: Two practice examsPDF copy of the bookBonus appendix with author's recommended tools, sites, and references Matt Walker, CEHv7, CPTS, CNDA, CCNA, MCSE, has held a wide variety of IT security teaching, writing, and leadership roles, including director of the Network Training Center on Ramstein AB, Germany, and IT security manager for Lockheed Martin at Kennedy Space Center. He is currently a security engineer for Hewlett-Packard. Full Product DetailsAuthor: Matt Walker , Angela Walker , Angela WalkerPublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Dimensions: Width: 19.10cm , Height: 3.30cm , Length: 24.10cm Weight: 0.905kg ISBN: 9780071772297ISBN 10: 0071772294 Pages: 416 Publication Date: 16 September 2011 Audience: Professional and scholarly , Professional & Vocational Format: Book Publisher's Status: Out of Print Availability: Awaiting stock ![]() Table of ContentsChapter 1. Ethical Hacking Basics Chapter 2. Cryptography 101 Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker Chapter 4. Scanning and Enumeration Chapter 5. Hacking Through the Network: Sniffers and Evasion Chapter 6. Attacking a System Chapter 7. Low Tech: Social Engineering and Physical Security Chapter 8. Web-Based Hacking: Servers and Applications Chapter 9. Wireless Network Hacking Chapter 10. Trojans and Other Attacks Chapter 11. The Pen Test: Putting It All Together Appendix A. Tool, Sites, and References Appendix B. About the CD Glossary IndexReviewsAuthor InformationMatt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract). Tab Content 6Author Website:Countries AvailableAll regions |