CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition

DOWNLOAD NOW »

Author: Matt Walker

Publisher: McGraw Hill Professional

ISBN: 0071836470

Category: Computers

Page: 464

View: 3242

Thoroughly revised for the latest release of the Certified Ethical Hacker (CEH) v8 certification exam Fully updated for the CEH v8 exam objectives, this comprehensive guide offers complete coverage of the EC-Council's Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the CEH exam. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this authoritative resource also serves as an essential on-the-job reference. Covers all exam topics, including: Introduction to ethical hacking Reconnaissance and footprinting Scanning and enumeration Sniffing and evasion Attacking a system Hacking web servers and applications Wireless network hacking Trojans and other attacks Cryptography Social engineering and physical security Penetration testing Electronic content includes: Hundreds of practice questions Test engine that provides customized exams by chapter

CEH Certified Ethical Hacker Bundle, Third Edition

DOWNLOAD NOW »

Author: Matt Walker

Publisher: McGraw Hill Professional

ISBN: 1259837556

Category: Computers

Page: N.A

View: 1595

Fully revised for the CEH v9 exam objectives, this valuable bundle includes two books, exclusive electronic content, and a bonus quick review guide This thoroughly updated, money-saving self-study set gathers essential exam-focused resources to use in preparation for the latest Certified Ethical Hacker exam. CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, provides an in-depth review that covers 100% of the exam’s objectives. CEH Certified Ethical Hacker Practice Exams, Third Edition, tests and reinforces this coverage with 500+ realistic practice questions. The CEH Certified Ethical Hacker Bundle, Third Edition, contains a bonus Quick Review Guide that can be used as the final piece for exam preparation. This content comes in addition to the electronic content included with the bundle’s component books. This new edition includes greater emphasis on cloud computing and mobile platforms and addresses new vulnerabilities to the latest technologies and operating systems. In all, the bundle includes more than 1000 accurate questions with detailed answer explanations Electronic content includes the Total Tester customizable exam engine, Quick Review Guide, and searchable PDF copies of both books Readers will save 12% compared to buying the two books separately, and the bonus Quick Review Guide is available only with the bundle

CEH Certified Ethical Hacker All-in-One Exam Guide

DOWNLOAD NOW »

Author: Matt Walker

Publisher: McGraw-Hill Prof Med/Tech

ISBN: 0071772294

Category: Computers

Page: 416

View: 2732

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL EXAM TOPICS, INCLUDING: Introduction to ethical hacking Cryptography Reconnaissance and footprinting Network scanning Enumeration System hacking Evasion techniques Social engineering and physical security Hacking web servers and applications SQL injection Viruses, trojans, and other attacks Wireless hacking Penetration testing CD-ROM FEATURES: Two practice exams PDF copy of the book Bonus appendix with author's recommended tools, sites, and references Matt Walker, CEHv7, CPTS, CNDA, CCNA, MCSE, has held a wide variety of IT security teaching, writing, and leadership roles, including director of the Network Training Center on Ramstein AB, Germany, and IT security manager for Lockheed Martin at Kennedy Space Center. He is currently a security engineer for Hewlett-Packard.

CEH Certified Ethical Hacker Practice Exams, Third Edition

DOWNLOAD NOW »

Author: Matt Walker

Publisher: McGraw Hill Professional

ISBN: 1259836592

Category: Computers

Page: N.A

View: 7082

Don’t Let the Real Test Be Your First Test! Fully updated for the CEH v9 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment test evaluates your readiness and identifies areas requiring further study. Designed to help you pass the exam, this is the perfect companion to CEHTM Certified Ethical Hacker All-in-One Exam Guide, Third Edition. Covers all exam topics, including: • Ethical hacking fundamentals • Reconnaissance and footprinting • Scanning and enumeration • Sniffing and evasion • Attacking a system • Hacking Web servers and applications • Wireless network hacking • Trojans and other attacks • Cryptography • Social engineering and physical security • Penetration testing Electronic content includes: • Test engine that provides full-length practice exams and customized quizzes by chapter • PDF copy of the book

IoT-Hacking

Sicherheitslücken im Internet der Dinge erkennen und schließen

DOWNLOAD NOW »

Author: Nitesh Dhanjani

Publisher: dpunkt.verlag

ISBN: 3864919282

Category: Computers

Page: 302

View: 1439

In Zukunft werden Milliarden "Dinge" über das Internet miteinander verbunden sein. Hierdurch entstehen jedoch auch gigantische Sicherheitsrisiken. In diesem Buch beschreibt der international renommierte IT-Sicherheitsexperte Nitesh Dhanjani, wie Geräte im Internet of Things von Angreifern missbraucht werden können – seien es drahtlose LED-Lampen, elektronische Türschlösser, Babyfone, Smart-TVs oder Autos mit Internetanbindung. Wenn Sie Anwendungen für Geräte entwickeln, die mit dem Internet verbunden sind, dann unterstützt Dhanjani Sie mit diesem Leitfaden bei der Erkennung und Behebung von Sicherheitslücken. Er erklärt Ihnen nicht nur, wie Sie Schwachstellen in IoT-Systemen identifizieren, sondern bietet Ihnen auch einen umfassenden Einblick in die Taktiken der Angreifer. In diesem Buch werden Sie • Design, Architektur und sicherheitstechnische Aspekte drahtloser Beleuchtungssysteme analysieren, • verstehen, wie elektronische Türschlösser geknackt werden, • Mängel im Sicherheitsaufbau von Babyfonen untersuchen, • die Sicherheitsfunktionen von Smart-Home-Geräten bewerten, • Schwachstellen von Smart-TVs kennenlernen, • Sicherheitslücken "intelligenter" Autos erforschen, • realistische Angriffsszenarios verstehen, die auf der gängigen Nutzung von IoT-Geräten durch Anwender beruhen. Darüber hinaus zeigt Ihnen Nitesh Dhanjani Prototyping-Methoden, die Sicherheitsfragen bereits bei den allerersten Entwürfen berücksichtigen. Schließlich erhalten Sie einen Ausblick auf neue Angriffsformen, denen IoTSysteme in Zukunft ausgesetzt sein werden. Stimmen zur Originalausgabe: "Dieses Buch enthüllt Sicherheitslücken, mit denen schon in naher Zukunft Milliarden vernetzter Geräte infiziert sein werden. Es bietet praktische Anleitungen zur Bewältigung aufkommender Sicherheitsrisiken für Verbraucher, Entwickler und Studierende gleichermaßen." Prof. em.

Routing-Protokolle und -Konzepte

CCNA Exploration Companion Guide

DOWNLOAD NOW »

Author: Rick Graziani,Allan Johnson

Publisher: Pearson Deutschland GmbH

ISBN: 9783827327192

Category:

Page: 694

View: 3125

Die Kunst des Human Hacking

Social Engineering - Deutsche Ausgabe

DOWNLOAD NOW »

Author: Christopher Hadnagy

Publisher: MITP-Verlags GmbH & Co. KG

ISBN: 382668687X

Category: Computers

Page: 464

View: 5349

Dieses Buch ist mehr als eine Sammlung cooler Stories, toller Hacks oder abgefahrener Ideen. Wissenschaftlich fundiert (dabei höchst unterhaltsam), stellt es das weltweit erste Framework für Social Engineering vor, auf dessen Grundlage der Autor genau analysiert, geradezu seziert, was einen guten Social Engineer ausmacht. Mit praktischen Ratschlägen wird der Leser befähigt, skills zu entwickeln, die es ihm ermöglichen, die nachweislich größte Schwachstelle in IT-Sicherheitssystemen auf die Probe zu stellen: den Menschen.

Mehr Hacking mit Python

Eigene Tools entwickeln für Hacker und Pentester

DOWNLOAD NOW »

Author: Justin Seitz

Publisher: dpunkt.verlag

ISBN: 3864917530

Category: Computers

Page: 182

View: 3579

Wenn es um die Entwicklung leistungsfähiger und effizienter Hacking-Tools geht, ist Python für die meisten Sicherheitsanalytiker die Sprache der Wahl. Doch wie genau funktioniert das? In dem neuesten Buch von Justin Seitz - dem Autor des Bestsellers »Hacking mit Python« - entdecken Sie Pythons dunkle Seite. Sie entwickeln Netzwerk-Sniffer, manipulieren Pakete, infizieren virtuelle Maschinen, schaffen unsichtbare Trojaner und vieles mehr. Sie lernen praktisch, wie man • einen »Command-and-Control«-Trojaner mittels GitHub schafft • Sandboxing erkennt und gängige Malware-Aufgaben wie Keylogging und Screenshotting automatisiert • Windows-Rechte mittels kreativer Prozesskontrolle ausweitet • offensive Speicherforensik-Tricks nutzt, um Passwort-Hashes abzugreifen und Shellcode in virtuelle Maschinen einzuspeisen • das beliebte Web-Hacking-Tool Burp erweitert • die Windows COM-Automatisierung nutzt, um einen Man-in-the-Middle-Angriff durchzuführen • möglichst unbemerkt Daten aus einem Netzwerk abgreift Eine Reihe von Insider-Techniken und kreativen Aufgaben zeigen Ihnen, wie Sie die Hacks erweitern und eigene Exploits entwickeln können.

Hacken für Dummies

DOWNLOAD NOW »

Author: Kevin Beaver

Publisher: John Wiley & Sons

ISBN: 3527805001

Category: Computers

Page: 370

View: 757

Fürchten Sie um Ihre Unternehmensdaten? Machen Sie sich Sorgen um Ihre IT-Systeme, wenn Sie wieder einmal lesen, dass unbekannte Hacker ein Unternehmen für Wochen lahmgelegt haben? Warten Sie nicht ab, bis es auch in Ihren Systemen passiert, sondern tun Sie etwas! Dabei hilft Ihnen dieses Buch. Versetzen Sie sich als erstes in die Rolle des Schurken und lernen Sie zu denken wie ein Krimineller! Wo sind die Hürden am niedrigsten? Welche grundlegenden Hackertechniken gibt es? Kevin Beaver zeigt Ihnen, wo Ihre Systeme verwundbar sein könnten, sodass Sie im Rennen um die IT-Sicherheit die Nase vorn behalten.

Google Hacking 2

Grundtechniken, erweterte Operatoren. Underground Googling. Wie man sich vor Google-Hackern schützt

DOWNLOAD NOW »

Author: Johnny Long

Publisher: N.A

ISBN: 9783826659423

Category:

Page: 543

View: 5009

Hacking

Die Kunst des Exploits

DOWNLOAD NOW »

Author: Jon Erickson

Publisher: N.A

ISBN: 9783898645362

Category: Computer networks

Page: 505

View: 5451

Cisco CCENT/CCNA ICND1 100-101

Das offizielle Handbuch zur erfolgreichen Zertifizierung. Übersetzung der 2. amerikanischen Auflage

DOWNLOAD NOW »

Author: Wendell Odom

Publisher: N.A

ISBN: 9783864901072

Category:

Page: 928

View: 5203

Projektmanagement auf der Grundlage von PRINCE2

PRINCE2 edition 2005

DOWNLOAD NOW »

Author: Bert Hedeman,Gabor Vis van Heemst,Hans Fredriksz

Publisher: Van Haren Publishing

ISBN: 9789077212646

Category: Political Science

Page: 277

View: 2254

On cover: Best practice

Certified Ethical Hacker (CEH) Cert Guide

DOWNLOAD NOW »

Author: Michael Gregg

Publisher: Pearson IT Certification

ISBN: 0133413020

Category: Computers

Page: 704

View: 2445

This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CEH v8 exam success with this cert guide from Pearson IT Certification, a leader in IT certification learning. Master CEH exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. You'll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. This EC-Council authorized study guide helps you master all the topics on the CEH v8 (312-50) exam, including: Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux and automated assessment tools Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Physical security and social engineering

Metasploit

DOWNLOAD NOW »

Author: N.A

Publisher: mitp Verlags GmbH & Co. KG

ISBN: 3826691768

Category:

Page: 368

View: 6651

Official Certified Ethical Hacker Review Guide: For Version 7.1

DOWNLOAD NOW »

Author: Steven DeFino,Larry Greenblatt

Publisher: Cengage Learning

ISBN: 1285225651

Category: Computers

Page: 416

View: 477

OFFICIAL CERTIFIED ETHICAL HACKER REVIEW GUIDE: FOR VERSION 7.1 is a valuable resource for anyone interested in pursuing the most recognized, respected hacking certification in the world. As experienced instructors of the International Council of Electronic Commerce Consultants (EC-Council), the authors draw on firsthand experience training top-caliber information security professionals for success on EC-Council's Certified Ethical Hacker (CEH) exam. The only exam review guide officially endorsed by the EC-Council, this proven resource focuses on the core concepts that are covered on the newest certification course (version 7.1), as well as a wide array of useful learning tools, including chapter objectives, step-by-step tutorials, Try it Out exercises and challenges, , group discussion topics, short lab examples, and practice exam questions and answers with explanations. This official CEH Exam review guide can be used to either preview and prepare for this comprehensive course or review afterwards to prepare for the challenging exam. It is the perfect compliment that gives any student a real advantage toward success with this certification. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

Guide to the Project Management Body of Knowledge (PMBOK(R) Guide-Sixth Edition / Agile Practice Guide Bundle (GERMAN)

DOWNLOAD NOW »

Author: Project Management Institute

Publisher: Project Management Institute

ISBN: 1628255307

Category: Business & Economics

Page: 976

View: 3766

To support the broadening spectrum of project delivery approaches, PMI is offering A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Sixth Edition as a bundle with its latest, the Agile Practice Guide. The PMBOK® Guide – Sixth Edition now contains detailed information about agile; while the Agile Practice Guide, created in partnership with Agile Alliance®, serves as a bridge to connect waterfall and agile. Together they are a powerful tool for project managers. The PMBOK® Guide – Sixth Edition – PMI's flagship publication has been updated to reflect the latest good practices in project management. New to the Sixth Edition, each knowledge area will contain a section entitled Approaches for Agile, Iterative and Adaptive Environments, describing how these practices integrate in project settings. It will also contain more emphasis on strategic and business knowledge—including discussion of project management business documents—and information on the PMI Talent Triangle™ and the essential skills for success in today's market. Agile Practice Guide has been developed as a resource to understand, evaluate, and use agile and hybrid agile approaches. This practice guide provides guidance on when, where, and how to apply agile approaches and provides practical tools for practitioners and organizations wanting to increase agility. This practice guide is aligned with other PMI standards, including A Guide to the Project Management Body of Knowledge (PMBOK® Guide) – Sixth Edition, and was developed as the result of collaboration between the Project Management Institute and the Agile Alliance.