Flylib.com
List of Exercises
Previous page
Table of content
Next page
Chapter 2: Access Controls
Exercise 2.01: Obtaining Access to Objects
Exercise 2.02: Brute Force Cracking with L0phtCrack
Chapter 3: Administration
Exercise 3.01: Viewing Discretionary Access Control Settings on UNIX
Chapter 4: Audit and Monitoring
Exercise 4.01: Security Checklist Audit
Exercise 4.02: Using a Wardialer
Chapter 5: Risk, Response, and Recovery
Exercise 5.01: Identifying Risks
Exercise 5.02: Risks and Threats
Exercise 5.03: Determining the Annual Loss Expected to Occur from Risks
Exercise 5.04: Alternate Sites
Exercise 5.05: Using Tools to View Volatile Data in Memory
Exercise 5.06: Acquiring Evidence Using EnCase
Chapter 6: Cryptography
Exercise 6.01: Cracking an NT Password Hash
Exercise 6.02: Binary Math with XOR
Exercise 6.02: Reviewing a Digital Certificate
Chapter 7: Data Communications
Exercise 7.01: ARP Spoofing
Chapter 8: Malicious Code and Malware
Exercise 8.01: Creating a Professional Virus Report
Exercise 8.02: Performing a Ping of Death Attack
Exercise 8.03: Capturing FTP with a Sniffer
Previous page
Table of content
Next page
SSCP Study Guide and DVD Training System
ISBN: 1931836809
EAN: 2147483647
Year: 2003
Pages: 135
Authors:
Jeffrey Posulns
,
Robert J. Shimonski
,
Jeremy Faircloth
BUY ON AMAZON
SQL Tips & Techniques (Miscellaneous)
Working with Queries, Expressions, and Aggregate Functions
Understanding SQL Transactions and Transaction Logs
Using Keys and Constraints to Maintain Database Integrity
Working with SQL JOIN Statements and Other Multiple-table Queries
Understanding Triggers
Network Security Architectures
The Attack Process
Applied Knowledge Questions
Applied Knowledge Questions
Topology Considerations
Threat Mitigation
Java for RPG Programmers, 2nd Edition
Data Types And Variables
Arrays And Vectors
Date And Time Manipulation
Database Access
More Java
C++ GUI Programming with Qt 3
Making Connections
Subclassing QTableItem
Graphics with QCanvas
Lists
Providing Online Help
The Java Tutorial: A Short Course on the Basics, 4th Edition
About the Java Technology
What Is Inheritance?
Arrays
General Programming Problems
Applet Problems
802.11 Wireless Networks: The Definitive Guide, Second Edition
1X on Wireless LANs
Differential Phase Shift Keying (DPSK)
WWiSE
Selecting Security Protocols
Standards Work
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies