CEH : official certified ethical hacker review guide /
Certified ethical hacker
Kimberly Graves
- Indianapolis, Ind. : Wiley Pub., c2007.
- xxii, 238 p. : ill. ; 23 cm. + 1 CD-ROM (4 3/4 in.)
Introduction to ethical hacking, ethics, and legality (Page-1), Footprinting and social engineering (Page-19), Scanning and enumeration (Page-41), System hacking (Page-67), Trojans, backdoors, viruses, and worms (Page-91), Sniffers (Page-107), Denial of service and session hijacking (Page-119), Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques (Page-137), SQL injection and buffer overflows (Page-151), Wireless hacking (Page-159), Physical security (Page-169), Linux hacking (Page-177), Evading IDSs, honeypots, and firewalls (Page-187), Cryptography (Page-195), Penetration testing methodologies (Page-203).