tailieunhanh - Ebook \(CE{H^{TM}}\) - Certified ethical hacker (Study Guide) - Part 2

Ebook \(CE{H^{TM}}\) - Certified ethical hacker (Study Guide) - Part 2 presents the following content: Chapter 9: attacking applications: SQL injection and buffer overflows; chapter 10: wireless network hacking; chapter 11: physical site security; chapter 12: hacking linux systems; chapter 13: bypassing network security: evading IDSs, honeypots, and firewalls; chapter 14: cryptography; chapter 15: performing a penetration test; Appendix: About the companion CD. |