The business and legal issues of ethical hacking -- Introduction to hacking -- Ethics and legality -- Penetration testing for business -- The pre-attack phases -- Footprinting -- Scanning -- Enumerating -- Attack techniques and tools -- System hacking techniques -- Trojans, backdoors, and sniffers -- Denial of service attacks and session hijacking -- Penetration testing steps -- Linus hacking tools -- Social engineering and physical security -- Web server and database attacks -- Web server hacking and Web application vulnerabilities -- SQL injection vulnerabilities -- Cryptography -- Cracking Web passwords -- Advanced topics -- Wireless network attacks and countermeasures -- Firewalls, intrusion detection systems and honeypots -- Viruses, worms, and buffer overflows -- Answers to sample questions -- Glossary of terms and acronyms -- What's on the CD.
0
OTHER EDITION IN ANOTHER MEDIUM
Title
CEH prep guide.
PARALLEL TITLE PROPER
Parallel Title
Comprehensive guide to certified ethical hacking
TOPICAL NAME USED AS SUBJECT
Computer networks-- Examinations, Study guides.
Computer networks-- Security measures-- Examinations, Study guides.
Computer security-- Testing-- Examinations, Study guides.