Writer : Kevin Beaver
Published Year : 2010
Publisher : Wiley Publishing, Inc.
ISBN: 978-0-470-55093-9
Size : 6 MB
CONTENTS
Part I: Building the Foundation for Ethical Hacking
- Chapter 1: Introduction to Ethical Hacking
- Chapter 2: Cracking the Hacker Mindset
- Chapter 3: Developing Your Ethical Hacking Plan
- Chapter 4: Hacking Methodology
Part II: Putting Ethical Hacking in Motion
- Chapter 5: Social Engineering
- Chapter 6: Physical Security
- Chapter 7: Passwords
Part III: Hacking the Network
- Chapter 8: Network Infrastructure
- Chapter 9: Wireless LANs
Part IV: Hacking Operating Systems
- Chapter 10: Windows
- Chapter 11: Linux
- Chapter 12: Novell NetWare
Part V: Hacking Applications
- Chapter 13: Communication and Messaging Systems
- Chapter 14: Web Sites and Applications
- Chapter 15: Databases and Storage Systems
Part VI: Ethical Hacking Aftermath
- Chapter 16: Reporting Your Results
- Chapter 17: Plugging Security Holes
- Chapter 18: Managing Security Changes
Part VII: The Part of Tens
- Chapter 19: Ten Tips for Getting Upper Management Buy-In
- Chapter 20: Ten Reasons Hacking Is the Only Effective Way to Test
- Chapter 21: Ten Deadly Mistakes
No comments:
Post a Comment