Official Certified Ethical Hacker Review Guide / Edition 1

Official Certified Ethical Hacker Review Guide / Edition 1

by Steven DeFino, Barry Kaufman
     
 

ISBN-10: 1435488539

ISBN-13: 9781435488533

Pub. Date: 11/09/2009

Publisher: Cengage Learning

Get ready for the latest Certified Ethical Hacker exam with the only book authorized by the creators of the certification, EC-Council! This book covers all of the various areas of the very challenging Certified Ethical Hacker exam, and includes hundreds of review questions in addition to refresher coverage of the information needed to successfully become a

Overview

Get ready for the latest Certified Ethical Hacker exam with the only book authorized by the creators of the certification, EC-Council! This book covers all of the various areas of the very challenging Certified Ethical Hacker exam, and includes hundreds of review questions in addition to refresher coverage of the information needed to successfully become a Certified Ethical Hacker. Including helpful at-a-glance quick reference boxes and tables, Exam Essentials summaries, review questions and answers, tutorial information and more, this resource is at once succinct and comprehensive. Not just an exam preparation tool, this book helps prepare future Certified Ethical Hackers to proactively protect their organization's systems from malicious hackers. It strengthens readers' knowledge that will help them successfully assess and analyze computer system weaknesses and vulnerabilities - so they can most effectively safeguard the organization's information and assets. This is the ideal resource for anyone looking to refresh their skills in this area, learn more about ethical hacking, or successfully pass the certification exam and become a Certified Ethical Hacker.

Product Details

ISBN-13:
9781435488533
Publisher:
Cengage Learning
Publication date:
11/09/2009
Series:
EC-Council Press Series
Pages:
384
Product dimensions:
7.20(w) x 9.10(h) x 0.80(d)

Table of Contents

1. Ethical Hacking. 2. Hacking Laws. 3. Footprinting. 4. Google Hacking. 5. Scanning. 6. Enumeration. 7. System Hacking. 8. Trojans and Backdoors. 9. Viruses and Worms. 10. Sniffers. 11. Social Engineering. 12. Denial of Service. 13. Buffer Overflows. 14. Web Servers and Applications. 15. Hacking Wireless Networks. 16. Cryptography. 17. Hacking with Linux. 18. IDS, Firewalls, Honeypots. 19. Summary of Optional Modules. 20. Penetration Testing. Appendix A: CEH Cheatsheets. Appendix B: Practice Exam Answers.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >