did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470231388

The CEHTM Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

by ;
  • ISBN13:

    9780470231388

  • ISBN10:

    0470231386

  • Format: eBook
  • Copyright: 2008-01-01
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $50.00
We're Sorry.
No Options Available at This Time.

Summary

The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests

Table of Contents

Foreword
Acknowledgments
Introduction
The Business and Legal Issues of Ethical Hacking
Introduction to Ethical Hacking
Legality and Ethics
Penetration Testing for Business
The Pre-Attack Phases
Footprinting
Scanning
Enumerating
Attack Techniques and Tools
System Hacking Techniques
Trojans, Backdoors, and Sniffers
Denial of Service Attacks and Session Hijacking
Penetration Testing Steps
Linux Hacking Tools
Social Engineering and Physical Security
Web Server and Database Attacks
Web Server Hacking and Web Application Vulnerabilities
SQL Injection Vulnerabilities
Cryptography
Cracking Web Passwords
Advanced Topics
Wireless Network Attacks and Countermeasures
Firewalls, Intrusion Detection Systems, and Honeypots
Viruses, Worms, and Buffer Overflows
Answers to Assessment Questions
Glossary of Terms and Acronyms
WhatÆs on the CD
Index
Table of Contents provided by Publisher. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program