CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50

Front Cover
John Wiley & Sons, May 7, 2007 - Study Aids - 238 pages
3 Reviews
Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so youíll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
  

What people are saying - Write a review

User Review - Flag as inappropriate

diwakar01

User Review - Flag as inappropriate

bokk is verr nice

Selected pages

Contents

Chapter 1 Introduction to Ethical Hacking Ethics and Legality
1
Chapter 2 Footprinting and Social Engineering
19
Chapter 3 Scanning and Enumeration
41
Chapter 4 System Hacking
67
Chapter 5 Trojans Backdoors Viruses and Worms
91
Chapter 6 Sniffers
107
Chapter 7 Denial of Service and Session Hijacking
119
Chapter 8 Hacking Web Servers Web Application Vulnerabilities and WebBased Password Cracking Techniques
137
Chapter 10 Wireless Hacking
159
Chapter 11 Physical Security
169
Chapter 12 Linux Hacking
177
Chapter 13 Evading IDSs Honeypots and Firewalls
187
Chapter 14 Cryptography
195
Chapter 15 Penetration Testing Methodologies
203
Glossary
213
Index
225

Chapter 9 SQL Injection and Buffer Overflows
151

Common terms and phrases

About the author (2007)

Kimberly Graves, CEH, CWSP, CWNP, and CWNA, has over ten years of IT experience. She currently works as an instructor with Symbol Technologies and other leading wireless and security vendors. She has served as subject matter expert for several certification programs, including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer.

Bibliographic information