Ethical Hacking and Countermeasures: Web Applications and Data ServersThe EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version. |
Wat mensen zeggen - Een review schrijven
We hebben geen reviews gevonden op de gebruikelijke plaatsen.
Overige edities - Alles bekijken
Ethical Hacking and Countermeasures: Web Applications and Data Servers EC-Council Geen voorbeeld beschikbaar - 2009 |
Veelvoorkomende woorden en zinsdelen
administrator allows application browser brute force brute force attack buffer overflow certification Click client command configured connection cookies Countermeasures CREATE credentials cross-site scripting Current on system database server default delete dictionary disabled downloaded e-mail EC-Council encrypted error messages execute exploit Firefox firewall hackers Hacking header host INFO input installed interface Internet Explorer IP address ISAPI login malicious method Microsoft Microsoft SQL Server monitor Navigate to Chapter NTLM ODBC options packet parameters Password Cracker patch protocol proxy remote Reproduction is strictly requests retrieve scan script SELECT sequence number session hijacking shown in Figure shows a screenshot spoofing SQL injection SQL injection attacks SQL Server stored strictly prohibited Figure Student Resource Center target testing tool Unicode update user’s valid Web application Web browser Web server Wget Windows zero-day attacks