Atnaujinkite slapukų nuostatas

El. knyga: CEH Certified Ethical Hacker Bundle, Second Edition

3.90/5 (103 ratings by Goodreads)
  • Formatas: 748 pages
  • Serija: All-in-One
  • Išleidimo metai: 06-Oct-2014
  • Leidėjas: McGraw-Hill Professional
  • Kalba: eng
  • ISBN-13: 9780071835602
Kitos knygos pagal šią temą:
  • Formatas: 748 pages
  • Serija: All-in-One
  • Išleidimo metai: 06-Oct-2014
  • Leidėjas: McGraw-Hill Professional
  • Kalba: eng
  • ISBN-13: 9780071835602
Kitos knygos pagal šią temą:

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Fully revised for the CEH v8 exam objectives, this money-saving self-study bundle includes two books, electronic content, and a bonus quick review guide.

CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition

  • Complete coverage of all CEH exam objectives
  • Ideal as both a study tool and an on-the-job resource
  • Electronic content includes hundreds of practice exam questions and a PDF copy of the book

CEH Certified Ethical Hacker Practice Exams, Second Edition

  • 650+ practice exam questions covering all CEH exam objectives
  • Realistic questions with detailed answer explanations
  • NEW pre-assessment test
  • PDF copy of the book

CEH Quick Review Guide

  • Final overview of key exam topics

CEH Certified Ethical Hacker Bundle, Second Edition covers all exam topics, including:

  • Introduction to ethical hacking
  • Reconnaissance and footprinting
  • Scanning and enumeration
  • Sniffing and evasion
  • Attacking a system
  • Hacking web servers and applications
  • Wireless network hacking
  • Trojans and other attacks
  • Cryptography
  • Social engineering and physical security
  • Penetration testing

CEH™ Certified Ethical Hacker
Acknowledgments
xv
Introduction
xvii
Chapter 1 Getting Started: Essential Knowledge
1(34)
Security 101
2(16)
Basic Networking
2(6)
Security Essentials
8(10)
Introduction to Ethical Hacking
18(10)
Hacking Terminology
18(8)
The Ethical Hacker
26(2)
Chapter Review
28(7)
Questions
30(3)
Answers
33(2)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
35(38)
Getting Started
36(6)
Vulnerability Research
37(5)
Footprinting
42(24)
Passive Footprinting
43(4)
Active Footprinting
47(1)
DNS Footprinting
48(10)
Determining Network Range
58(2)
Google Hacking
60(5)
Footprinting Tools
65(1)
Chapter Review
66(7)
Questions
69(2)
Answers
71(2)
Chapter 3 Scanning and Enumeration
73(44)
Scanning Fundamentals
74(1)
Scanning Methodology
74(27)
The TCP Handshake
75(9)
Identifying Targets
84(5)
Port Scanning
89(12)
Enumeration
101(8)
Windows System Basics
101(3)
Enumeration Techniques
104(5)
Chapter Review
109(8)
Questions
112(3)
Answers
115(2)
Chapter 4 Sniffing and Evasion
117(38)
Fundamentals
118(12)
How It All Works
118(9)
Passive and Active Sniffing
127(3)
Sniffing Tools and Techniques
130(5)
Wireshark
130(4)
Other Tools
134(1)
Evasion
135(11)
IDS
135(8)
Firewalls
143(3)
Chapter Review
146(9)
Questions
151(3)
Answers
154(1)
Chapter 5 Attacking a System
155(44)
Getting Started
156(14)
Methodology
156(2)
Windows Security Architecture
158(6)
Linux Security Architecture
164(6)
Cracking Passwords
170(9)
Password 101
171(1)
Password Attacks
172(7)
Privilege Escalation and Executing Applications
179(5)
Privilege Escalation
180(3)
Executing Applications
183(1)
Stealth
184(6)
Hiding Files and Activity
184(4)
Covering Your Tracks
188(2)
Chapter Review
190(9)
Questions
194(2)
Answers
196(3)
Chapter 6 Web-Based Hacking: Servers and Applications
199(30)
Attacking Web Servers
200(11)
Web Server Architecture
200(4)
Attack Methodology
204(2)
Web Server Attacks
206(5)
Attacking Web Applications
211(10)
Web Application Architecture
211(1)
Application Attacks
212(5)
SQL Injection
217(4)
Chapter Review
221(8)
Questions
224(3)
Answers
227(2)
Chapter 7 Wireless Network Hacking
229(34)
Wireless 101
230(12)
Wireless Architecture and Standards
230(7)
Finding and Identifying Wireless Networks
237(5)
Wireless Hacking
242(12)
Wireless Attacks
242(8)
Mobile Platform Attacks
250(4)
Chapter Review
254(9)
Questions
259(2)
Answers
261(2)
Chapter 8 Trojans and Other Attacks
263(30)
The "Malware" Attacks
264(12)
Trojans, Backdoors, Viruses, and Worms
264(12)
Remaining Attacks
276(8)
Denial of Service
277(4)
Session Hijacking
281(3)
Chapter Review
284(9)
Questions
289(3)
Answers
292(1)
Chapter 9 Cryptography 101
293(28)
Cryptography and Encryption Overview
294(12)
Encryption Algorithms and Techniques
295(11)
PKI, the Digital Certificate, and Digital Signatures
306(6)
The PKI System
307(1)
Digital Certificates
308(3)
Digital Signatures
311(1)
Encrypted Communication and Cryptography Attacks
312(3)
Data Encryption: At Rest and While Communicating
312(2)
Cryptography Attacks
314(1)
Chapter Review
315(6)
Questions
317(3)
Answers
320(1)
Chapter 10 Low Tech: Social Engineering and Physical Security
321(30)
Social Engineering
322(12)
Human-Based Attacks
323(4)
Computer-Based Attacks
327(6)
Mobile-Based Attacks
333(1)
Physical Security
334(10)
Physical Security 101
335(9)
Chapter Review
344(7)
Questions
346(3)
Answers
349(2)
Chapter 11 The Pen Test: Putting It All Together
351(16)
Methodology and Steps
352(8)
The Security Assessments
352(7)
Security Assessment Deliverables
359(1)
Miscellaneous Information
360(3)
Guidelines
360(1)
More Terminology
361(2)
Chapter Review
363(4)
Questions
364(2)
Answers
366(1)
Appendix A Tool, Sites, and References
367(16)
Vulnerability Research Sites
367(1)
Footprinting Tools
368(2)
People Search Tools
368(1)
Competitive Intelligence
368(1)
Website Research Tools
368(1)
DNS and Whois Tools
368(1)
Traceroute Tools and Links
369(1)
Website Mirroring Tools and Sites
369(1)
E-mail Tracking
369(1)
Google Hacking
369(1)
Scanning and Enumeration Tools
370(2)
Ping Sweep
370(1)
Scanning Tools
370(1)
War Dialing
370(1)
Banner Grabbing
371(1)
Vulnerability Scanning
371(1)
Network Mapping
371(1)
Proxy, Anonymizer, and Tunneling
371(1)
Enumeration
372(1)
SNMP Enumeration
372(1)
System Hacking Tools
372(3)
Password Hacking Tools
372(1)
Sniffing
373(1)
Keyloggers and Screen Capture
373(1)
Privilege Escalation
373(1)
Executing Applications
374(1)
Spyware
374(1)
Covering Tracks
374(1)
Packet Crafting/Spoofing
374(1)
Session Hijacking
375(1)
Cryptography and Encryption
375(1)
Encryption Tools
375(1)
Hash Tools
375(1)
Steganography
375(1)
Cryptanalysis
376(1)
Sniffing
376(1)
Packet Capture
376(1)
Wireless
376(1)
MAC Flooding/Spoofing
377(1)
ARP Poisoning
377(1)
Wireless
377(1)
Discovery
377(1)
Packet Sniffing
377(1)
WEP/WPA Cracking
377(1)
Bluetooth
378(1)
Mobile Device Tracking
378(1)
Trojans and Malware
378(1)
Wrappers
378(1)
Monitoring Tools
378(1)
Attack Tools
379(1)
IDS
379(1)
Evasion Tools
379(1)
Wireless
379(1)
Web Attacks
380(1)
SQL Injection
380(1)
Miscellaneous
380(1)
Pen Test Suites
380(1)
VPN/FW Scanner
381(1)
Social Engineering
381(1)
Extras
381(1)
Linux Distributions
381(1)
Tools, Sites, and References Disclaimer
381(2)
Appendix B About the CD-ROM
383(2)
System Requirements
383(1)
Installing and Running Total Tester
383(1)
Total Tester
383(1)
Free PDF Copy of the Book
384(1)
Technical Support
384(1)
Glossary
385(30)
Index
415
CEH™ Certified Ethical Hacker Practice Exams
Acknowledgments
vii
Introduction
viii
Chapter 1 Getting Started: Essential Knowledge
1(30)
Questions
3(6)
Quick Answer Key
9(1)
Answers
10(21)
Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker
31(30)
Questions
33(8)
Quick Answer Key
41(1)
Answers
42(19)
Chapter 3 Scanning and Enumeration
61(28)
Questions
63(7)
Quick Answer Key
70(1)
Answers
71(18)
Chapter 4 Sniffing and Evasion
89(26)
Questions
91(6)
Quick Answer Key
97(1)
Answers
98(17)
Chapter 5 Attacking a System
115(28)
Questions
117(7)
Quick Answer Key
124(1)
Answers
125(18)
Chapter 6 Web-Based Hacking: Servers and Applications
143(28)
Questions
145(6)
Quick Answer Key
151(1)
Answers
152(19)
Chapter 7 Wireless Network Hacking
171(26)
Questions
173(6)
Quick Answer Key
179(1)
Answers
180(17)
Chapter 8 Trojans and Other Attacks
197(28)
Questions
199(6)
Quick Answer Key
205(1)
Answers
206(19)
Chapter 9 Cryptography 101
225(30)
Questions
227(7)
Quick Answer Key
234(1)
Answers
235(20)
Chapter 10 Low Tech: Social Engineering and Physical Security
255(26)
Questions
257(6)
Quick Answer Key
263(1)
Answers
264(17)
Chapter 11 The Pen Test: Putting It All Together
281(28)
Questions
283(6)
Quick Answer Key
289(1)
Answers
290(19)
Appendix A Pre-assessment Test
309(26)
Questions
310(12)
Quick Answer Key
322(1)
Answers
323(9)
Analyzing Your Results
332(3)
Appendix B About the CD-ROM
335
System Requirements
335(1)
Total Tester Premium Practice Exam Software
335(1)
Installing and Running Total Tester Premium Practice Exam Software
335(1)
PDF Copy of the Book
336(1)
Technical Support
336
Total Seminars Technical Support
336(1)
McGraw-Hill Education Content Support
336
Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).