Wiley
Wiley.com
Print this page Share

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

ISBN: 978-0-470-13592-1
768 pages
October 2007
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking (0470135921) cover image
  • The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope
  • Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more
  • Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking
  • Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
See More
Foreword.

Acknowledgments.

Introduction.

Part I: The Business and Legal Issues of Ethical Hacking.

Chapter 1: Introduction to Ethical Hacking.

Chapter 2: Legality and Ethics.

Chapter 3: Penetration Testing for Business.

Part II: The Pre-Attack Phases.

Chapter 4: Footprinting.

Chapter 5: Scanning.

Chapter 6: Enumerating.

Part III: Attack Techniques and Tools.

Chapter 7: System Hacking Techniques.

Chapter 8: Trojans, Backdoors, and Sniffers.

Chapter 9: Denial of Service Attacks and Session Hijacking.

Chapter 10: Penetration Testing Steps.

Chapter 11: Linux Hacking Tools.

Chapter 12: Social Engineering and Physical Security.

Part IV: Web Server and Database Attacks.

Chapter 13: Web Server Hacking and Web Application Vulnerabilities.

Chapter 14: SQL Injection Vulnerabilities.

Chapter 15: Cryptography.

Chapter 16: Cracking Web Passwords.

Part V: Advanced Topics.

Chapter 17: Wireless Network Attacks and Countermeasures.

Chapter 18: Firewalls, Intrusion Detection Systems, and Honeypots.

Chapter 19: Viruses, Worms, and Buffer Overflows.

Appendix A: Answers to Assessment Questions.

Appendix B: Glossary of Terms and Acronyms.

Appendix C: What’s on the CD.

Index.

See More
RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series.

RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE, MCNE, is Chief Security Advisor for Gotham Technology Group, LLC. He is the author or coauthor of numerous bestselling information system security publications, and is a consulting editor for John Wiley and Sons for its information security book series.

See More
Download TitleSizeDownload
Errata for Chapter 18
Corrected Chapter 18 pages 450-454, containing correct versions of Figures 18-1 through 8-4, are in the attached zip file.
250.33 KB Click to Download
See More

Do you think you've discovered an error in this book? Please check the list of errata below to see if we've already addressed the error. If not, please submit the error via our Errata Form. We will attempt to verify your error; if you're right, we will post a correction below.

ChapterPageDetailsDatePrint Run
18 450-454 Chapter 18 errata
Zip file containing revised pages 450-454 of Chapter 18, replacing Figures 18-1 through 18-4 with correct versions. (Pages reflowed from originals.) File is located under Downloads.
11/9/07 1st
505 Error in Test Question
The correct answer to question 26, Chapter 1 should be "b", not "d."
05/04/2008
See More
Buy Both and Save 25%!
+

The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking (US $50.00)

-and- Liars and Outliers: Enabling the Trust that Society Needs to Thrive (US $24.95)

Total List Price: US $74.95
Discounted Price: US $56.21 (Save: US $18.74)

Buy Both
Cannot be combined with any other offers. Learn more.
Back to Top