TOP
0
0
三民出版.新書搶先報|最速、最優惠的新鮮貨報給你知!
THE CEH PREP GUIDE: THE COMPREHENSIVE GUIDE TO CERTIFIED ETHICAL HACKING
滿額折

THE CEH PREP GUIDE: THE COMPREHENSIVE GUIDE TO CERTIFIED ETHICAL HACKING

商品資訊

定價
:NT$ 1898 元
優惠價
901708
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點:51 點
商品簡介
作者簡介
目次
相關商品

商品簡介

The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests

作者簡介

RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series.
RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE, MCNE, is Chief Security Advisor for Gotham Technology Group, LLC. He is the author or coauthor of numerous bestselling information system security publications, and is a consulting editor for John Wiley and Sons for its information security book series.

目次

Foreword.
Acknowledgments.
Introduction.
Part I: The Business and Legal Issues of Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Legality and Ethics.
Chapter 3: Penetration Testing for Business.
Part II: The Pre-Attack Phases.
Chapter 4: Footprinting.
Chapter 5: Scanning.
Chapter 6: Enumerating.
Part III: Attack Techniques and Tools.
Chapter 7: System Hacking Techniques.
Chapter 8: Trojans, Backdoors, and Sniffers.
Chapter 9: Denial of Service Attacks and Session Hijacking.
Chapter 10: Penetration Testing Steps.
Chapter 11: Linux Hacking Tools.
Chapter 12: Social Engineering and Physical Security.
Part IV: Web Server and Database Attacks.
Chapter 13: Web Server Hacking and Web Application Vulnerabilities.
Chapter 14: SQL Injection Vulnerabilities.
Chapter 15: Cryptography.
Chapter 16: Cracking Web Passwords.
Part V: Advanced Topics.
Chapter 17: Wireless Network Attacks and Countermeasures.
Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots.
Chapter 19: Viruses, Worms, and Buffer Overflows.
Appendix A: Answers to Assessment Questions.
Appendix B: Glossary of Terms and Acronyms.
Appendix C: What’s on the CD.
Index.

您曾經瀏覽過的商品

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

優惠價:90 1708
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區