جزییات کتاب
There has never been a Certified Ethical Hacker (CEH) Guide like this. Certified Ethical Hacker (CEH) 31 Success Secrets is not about the ins and outs of Certified Ethical Hacker (CEH). Instead, it answers the top 31 questions that we are asked and those we come across in our forums, consultancy and education programs. It tells you exactly how to deal with those questions, with tips that have never before been offered in print. Get the information you need--fast! This comprehensive guide offers a thorough view of key knowledge and detailed insight. This Guide introduces everything you want to know to be successful with Certified Ethical Hacker (CEH). A quick look inside of the subjects covered: What is the Foundation of Security? - Certified Ethical Hacker (CEH), Common types of trojans you should protect against - Certified Ethical Hacker (CEH), How to protect from DoS attacks - Certified Ethical Hacker (CEH), How do viruses infect your computer system? - Certified Ethical Hacker (CEH), Hacking is a criminal offence, according to the crimes and Criminal Procedure section 1029 - Certified Ethical Hacker (CEH), Three different types of hackers - Certified Ethical Hacker (CEH), What is an Ethical Hacker? - Certified Ethical Hacker (CEH), What skills do you need to become an Ethical Hacker? - Certified Ethical Hacker (CEH), What is a passive attack? - Certified Ethical Hacker (CEH), What is footprinting and how does an ethical hacker use this? - Certified Ethical Hacker (CEH), What are the prerequisites for the CEH exam? - Certified Ethical Hacker (CEH), Terminology used in the CEH ethical hacker exam - Certified Ethical Hacker (CEH), What is a TCP three-way handshake? - Certified Ethical Hacker (CEH), Countermeasures to have in place against password cracking - Certified Ethical Hacker (CEH), Examples of the most common web server vulnerabilities - Certified Ethical Hacker (CEH), What are the most common virus detection methods? - Certified Ethical Hacker (CEH), What is the difference between a virus and a worm? - Certified Ethical Hacker (CEH), Tools of the trade for ethical hackers - Certified Ethical Hacker (CEH), How does banner grabbing help fingerprinting? - Certified Ethical Hacker (CEH), Common NMAP commands - Certified Ethical Hacker (CEH), Overt and covert channels - Certified Ethical Hacker (CEH), What is Enumeration? - Certified Ethical Hacker (CEH), What is the focus of an Ethical hacker (a.k.a Penetration Tester)? - Certified Ethical Hacker (CEH), What are Ping Sweeps and how are they used? - Certified Ethical Hacker (CEH), Hacking tools used for HTTP tunnelling techniques - Certified Ethical Hacker (CEH), What is ARP poisoning and how do you prevent it from happening? - Certified Ethical Hacker (CEH), and much more...