دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: [5th edition.] نویسندگان: Matt Walker, Safari. an O'Reilly Media Company. سری: ناشر: سال نشر: 2021 تعداد صفحات: [964] زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 30 Mb
در صورت تبدیل فایل کتاب CEH Certified Ethical Hacker All-in-One Exam Guide, Fifth Edition, 5th Edition به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب راهنمای آزمون همه کاره هکر اخلاقی CEH، ویرایش پنجم، ویرایش پنجم نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Copyright Contents CEH™ Certified Ethical Hacker Cover CEH™ Certified Ethical Hacker ABOUT THE AUTHOR Title Copyright Dedication CONTENTS AT A GLANCE CONTENTS ACKNOWLEDGMENTS INTRODUCTION Getting Started: Essential Knowledge Security 101 Essentials Security Basics Introduction to Ethical Hacking Hacking Terminology The Ethical Hacker Chapter Review Questions Answers Reconnaissance: Information Gathering for the Ethical Hacker Footprinting Passive Footprinting Active Footprinting Footprinting Methods and Tools Search Engines Website and E-mail Footprinting DNS Footprinting Network Footprinting Other Tools Chapter Review Questions Answers Scanning and Enumeration Fundamentals TCP/IP Networking Subnetting Scanning Methodology Identifying Targets Port Scanning Evasion Vulnerability Scanning Enumeration Windows System Basics Unix/Linux System Basics Enumeration Techniques Chapter Review Questions Answers Sniffing and Evasion Essentials Network Knowledge for Sniffing Active and Passive Sniffing Sniffing Tools and Techniques Techniques Tools Evasion Devices Aligned Against You Evasion Techniques Chapter Review Questions Answers Attacking a System Getting Started Windows Security Architecture Linux Security Architecture Methodology Hacking Steps Authentication and Passwords Privilege Escalation and Executing Applications Hiding Files and Covering Tracks Chapter Review Questions Answers Web-Based Hacking:Ser vers and Applications Web Servers Nonprofit Organizations Promoting Web Security Attack Methodology Web Server Architecture Web Server Attacks Attacking Web Applications Application Attacks Countermeasures Chapter Review Questions Answers Wireless Network Hacking Wireless Networking Wireless Terminology, Architecture, and Standards Wireless Hacking Chapter Review Questions Answers The Mobile World Mobile Vulnerabilities and Risks Mobile Platforms and Attacks IoT IoT Architecture IoT Vulnerabilities and Attacks IoT Hacking Methodology OT Hacking Definition and Concepts Security Concerns Chapter Review Questions Answers Security in CloudComputing Cloud Computing Cloud Computing Service Types Cloud Deployment Models Cloud Security Cloud Threats Cloud Attacks and Mitigations Cloud Hacking Chapter Review Questions Answers The “Malware” Attacks Trojans Viruses and Worms Fileless Malware Malware Analysis Malware Countermeasures Remaining Attacks Denial of Service Session Hijacking Chapter Review Questions Answers Cryptography 101 Cryptography and Encryption Overview Terminology Encryption Algorithms and Techniques PKI, the Digital Certificate, and Digital Signatures The PKI System Digital Certificates Digital Signatures To Sum Up Encrypted Communication and Cryptography Attacks Encrypted Communication Cryptography Attacks Chapter Review Questions Answers Low Tech:Social Engineeringand Physical Security Social Engineering Human-Based Social Engineering Attacks Computer-Based Attacks Mobile-Based Attacks Preventing Social Engineering Attacks Physical Security Physical Security 101 Testing Physical Security Chapter Review Questions Answers The Pen Test:Putting It All Together Methodology and Steps Security Assessments Security Assessment Deliverables Guidelines More Terminology Chapter Review Questions Answers Appendix A Tool, Sites, and References Vulnerability Research Sites Footprinting Tools Scanning and Enumeration Tools System Hacking Tools Cryptography and Encryption Sniffing Wireless Mobile and IoT Trojans and Malware Web Attacks Miscellaneous Tools, Sites, and References Disclaimer Appendix B About the Online Content System Requirements Your Total Seminars Training Hub Account Privacy Notice Single User License Terms and Conditions TotalTester Online Technical Support CEH™Certified Ethical Hacker Practice Exams Cover CEH™Certified Ethical Hacker Practice Exams ABOUT THE AUTHOR Title Copyright Dedication CONTENTS AT A GLANCE CONTENTS ACKNOWLEDGMENTS INTRODUCTION Getting Started: Essential Knowledge QUESTIONS QUICK ANSWER KEY ANSWERS Reconnaissance: Information Gathering for the Ethical Hacker QUESTIONS QUICK ANSWER KEY ANSWERS Scanning and Enumeration QUESTIONS QUICK ANSWER KEY ANSWERS Sniffing and Evasion QUESTIONS QUICK ANSWER KEY ANSWERS Attacking a System QUESTIONS QUICK ANSWER KEY ANSWERS Web-Based Hacking: Ser vers and Applications QUESTIONS QUICK ANSWER KEY ANSWERS Wireless Network Hacking QUESTIONS QUICK ANSWER KEY ANSWERS Mobile Communications and the IoT QUESTIONS QUICK ANSWER KEY ANSWERS Security in Cloud Computing QUESTIONS QUICK ANSWER KEY ANSWERS Trojans and Other Attacks QUESTIONS QUICK ANSWER KEY ANSWERS Cryptography 101 QUESTIONS QUICK ANSWER KEY ANSWERS Low Tech: Social Engineering and Physical Security QUESTIONS QUICK ANSWER KEY ANSWERS The Pen Test: Putting It All Together QUESTIONS QUICK ANSWER KEY ANSWERS About the Online Content