did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470642863

CEH® Certified Ethical Hacker Study Guide

by
  • ISBN13:

    9780470642863

  • ISBN10:

    0470642866

  • Format: eBook
  • Copyright: 2010-04-01
  • Publisher: Sybex
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99
We're Sorry.
No Options Available at This Time.

Summary

Prepare for the new version of CEH certification with this advanced guide. Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more * Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts * Includes a CD with review questions, bonus exams, and more study tools. This is the ideal guide to prepare you for the new CEH certification exam.

Table of Contents

Introduction to Ethical Hacking, Ethics, and Legality
Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering
Gathering Network and Host Information: Scanning and Enumeration
System Hacking: Password Cracking, Escalating Privileges, and Hiding Files
Installing Software on Target Systems: Spyware, Trojans, Backdoors, Viruses, and Worms
Gathering Data from Networks: Sniffers
Denial of Service and Session Hijacking
Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques
Attacking Applications: SQL Injection and Buffer Overflows
Wireless Network Hacking
Physical Site Security
Hacking Linux Systems
Bypassing Network Security: Evading IDS, Honeypots, and Firewalls
Understanding Cryptography
Performing a Penetration Test
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program