免费下载书籍地址:PDF下载地址
精美图片

CEH 备考指南The CEHTM Prep Guide书籍详细信息
- ISBN:9780470135921
- 作者:暂无作者
- 出版社:暂无出版社
- 出版时间:2007-10
- 页数:738
- 价格:372.20
- 纸张:胶版纸
- 装帧:精装
- 开本:16开
- 语言:未知
- 丛书:暂无丛书
- TAG:暂无
- 豆瓣评分:暂无豆瓣评分
内容简介:
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
书籍目录:
Foreword.
Acknowledgments.
Introduction.
Part I: The Business and Legal Issues of Ethical Hacking.
Chapter 1: Introduction to Ethical Hacking.
Chapter 2: Legality and Ethics.
Chapter 3: Penetration Testing for Business.
Part II: The Pre-Attack Phases.
Chapter 4: Footprinting.
Chapter 5: Scanning.
Chapter 6: Enumerating.
Part III: Attack Techniques and Tools.
Chapter 7: System Hacking Techniques.
Chapter 8: Trojans, Backdoors, and Sniffers.
Chapter 9: Denial of Service Attacks and Session Hijacking.
Chapter 10: Penetration Testing Steps.
Chapter 11: Linux Hacking Tools.
Chapter 12: Social Engineering and Physical Security.
Part IV: Web Server and Database Attacks.
Chapter 13: Web Server Hacking and Web Application Vulnerabilities.
Chapter 14: SQL Injection Vulnerabilities.
Chapter 15: Cryptography.
Chapter 16: Cracking Web Passwords.
Part V: Advanced Topics.
Chapter 17: Wireless Network Attacks and Countermeasures.
Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots.
Chapter 19: Viruses, Worms, and Buffer Overflows.
Appendix A: Answers to Assessment Questions.
Appendix B: Glossary of Terms and Acronyms.
Appendix C: What’s on the CD.
Index.
作者介绍:
暂无相关内容,正在全力查找中
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
在线阅读地址:CEH 备考指南The CEHTM Prep Guide在线阅读
在线听书地址:CEH 备考指南The CEHTM Prep Guide在线收听
在线购买地址:CEH 备考指南The CEHTM Prep Guide在线购买
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
编辑推荐
作者简介:
RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series.
书籍介绍
在线阅读本书
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
书籍真实打分
故事情节:8分
人物塑造:9分
主题深度:7分
文字风格:7分
语言运用:3分
文笔流畅:8分
思想传递:6分
知识深度:8分
知识广度:5分
实用性:7分
章节划分:3分
结构布局:5分
新颖与独特:8分
情感共鸣:4分
引人入胜:4分
现实相关:9分
沉浸感:9分
事实准确性:8分
文化贡献:9分
网站评分
书籍多样性:5分
书籍信息完全性:5分
网站更新速度:8分
使用便利性:9分
书籍清晰度:5分
书籍格式兼容性:7分
是否包含广告:6分
加载速度:7分
安全性:9分
稳定性:5分
搜索功能:3分
下载便捷性:3分
下载点评
- 一般般(329+)
- azw3(510+)
- 超值(395+)
- 字体合适(286+)
- pdf(188+)
- 少量广告(95+)
下载评价
网友 邱***洋:不错,支持的格式很多
网友 薛***玉:就是我想要的!!!
网友 曹***雯:为什么许多书都找不到?
网友 孔***旋:很好。顶一个希望越来越好,一直支持。
网友 潘***丽:这里能在线转化,直接选择一款就可以了,用他这个转很方便的
网友 冯***卉:听说内置一千多万的书籍,不知道真假的
网友 通***蕊:五颗星、五颗星,大赞还觉得不错!~~
网友 蓬***之:好棒good
网友 融***华:下载速度还可以
网友 谢***灵:推荐,啥格式都有
网友 瞿***香:非常好就是加载有点儿慢。
网友 常***翠:哈哈哈哈哈哈
网友 濮***彤:好棒啊!图书很全
网友 寿***芳:可以在线转化哦
网友 苍***如:什么格式都有的呀。