Flylib.com
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Part I: Exam Preparation
The Business Aspects of Penetration Testing
The Business Aspects of Penetration Testing
Study Strategies
Security Fundamentals
Security Testing
Hacker and Cracker Descriptions
Ethical Hackers
Test PlansKeeping It Legal
Ethics and Legality
Summary
Key Terms
Apply Your Knowledge
The Technical Foundations of Hacking
The Technical Foundations of Hacking
Study Strategies
The Attackers Process
The Ethical Hackers Process
Security and the Stack
Summary
Key Terms
Apply Your Knowledge
Footprinting and Scanning
Footprinting and Scanning
Study Strategies
Determining Assessment Scope
The Seven-Step Information Gathering Process
Summary
Key Terms
Apply Your Knowledge
Enumeration and System Hacking
Enumeration and System Hacking
Study Strategies
The Architecture of Windows Computers
Enumeration
Windows Hacking
Summary
Key Terms
Apply Your Knowledge
Linux and Automated Security Assessment Tools
Linux and Automated Security Assessment Tools
Study Strategies
Linux
Automated Assessment Tools
Picking the Right Platform
Summary
Key Terms
Apply Your Knowledge
Trojans and Backdoors
Trojans and Backdoors
Study Strategies
An Overview of TrojansThe History of Trojans
Covert Communications
Trojan and Backdoor Countermeasures
Summary
Key Terms
Apply Your Knowledge
Sniffers, Session Hijacking, and Denial of Service
Sniffers, Session Hijacking, and Denial of Service
Study Strategies
Sniffers
Session Hijacking
Denial of Service
Summary
Key Terms
Apply Your Knowledge
Web Server Hacking, Web Applications, and Database Attacks
Web Server Hacking, Web Applications, and Database Attacks
Study Strategies
Web Server Hacking
Web Application Hacking
Database Overview
Summary
Key Terms
Apply Your Knowledge
Wireless Technologies, Security, and Attacks
Wireless Technologies, Security, and Attacks
Study Strategies
Wireless TechnologiesA Brief History
Wireless LANs
Wireless Hacking Tools
Securing Wireless Networks
Summary
Key Terms
Apply Your Knowledge
IDS, Firewalls, and Honeypots
IDS, Firewalls, and Honeypots
Study Strategies
Intrusion Detection Systems
Firewalls
Honeypots
Summary
Key Terms
Apply Your Knowledge
Buffer Overflows, Viruses, and Worms
Buffer Overflows, Viruses, and Worms
Study Strategies
Buffer Overflows
Viruses and Worms
Summary
Key Terms
Apply Your Knowledge
Cryptographic Attacks and Defenses
Cryptographic Attacks and Defenses
Study Strategies
Functions of Cryptography
History of Cryptography
Algorithms
Hashing
Digital Signatures
Steganography
Digital Certificates
Public Key Infrastructure
Protocols, Standards, and Applications
Encryption Cracking and Tools
Summary
Key Terms
Apply Your Knowledge
Physical Security and Social Engineering
Physical Security and Social Engineering
Study Strategies
Physical Security
Social Engineering
Summary
Key Terms
Apply Your Knowledge
Part II: Final Review
Fast Facts
Ethics and Legality
Footprinting
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Hacking Web Servers
Web Application Vulnerabilities
Web-Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Virus and Worms
Physical Security
Linux Hacking
Evading Firewalls, IDS, and Honeypots
Buffer Overflows
Cryptography
Penetration Testing
Certified Ethical Hacker
Practice Exam Questions
Answers to Practice Exam Questions
Glossary
Part III: Appendixes
Appendix B. Preparing Your System for Knoppix-std
Appendix A. Using the ExamGear Special Edition Software
Appendix A. Using the ExamGear Special Edition Software
Exam Simulation
Study Tools
How ExamGear Special Edition Works
Installing ExamGear Special Edition
Using ExamGear Special Edition
Contacting Que Certification
License
Software and Documentation
License Term and Charges
Title
Updates
Limited Warranty and Disclaimer
Limitation of Liability
Miscellaneous
U.S. Government Restricted Rights
Certified Ethical Hacker Exam Prep
ISBN: 0789735318
EAN: 2147483647
Year: 2007
Pages: 247
Authors:
Michael Gregg
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Introduction
ORM Constraints
Editing Logical Models”Intermediate Aspects
Editing Logical Models”Advanced Aspects
Reverse Engineering Physical Schemas to Logical Models
Snort Cookbook
Sniffing Gigabit Ethernet
Logging Application Data
Logging to System Logfiles
Detecting IDS Evasion
Installing and Configuring IDScenter
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Leading change
Mergers and acquisitions
Cultural change
Cisco Voice Gateways and Gatekeepers
Dial Plan Considerations
Analog Trunks
Quality of Service
MGCP Gateway Fallback
Transcoding for CallManager Express
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Creating My First Notes Database
Design Tabs
Project A: Build a Connection Document Database
Managing Access to Forms and Documents
Common Database Problems
Programming Microsoft ASP.NET 3.5
ASP.NET Core Server Controls
The ADO.NET Object Model
Paging Through Data Sources
Real-World Data Access
ASP.NET Mobile Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies