Flylib.com
List of Exercises
Previous page
Table of content
Next page
Chapter 2: Access Controls
Exercise 2.01: Obtaining Access to Objects
Exercise 2.02: Brute Force Cracking with L0phtCrack
Chapter 3: Administration
Exercise 3.01: Viewing Discretionary Access Control Settings on UNIX
Chapter 4: Audit and Monitoring
Exercise 4.01: Security Checklist Audit
Exercise 4.02: Using a Wardialer
Chapter 5: Risk, Response, and Recovery
Exercise 5.01: Identifying Risks
Exercise 5.02: Risks and Threats
Exercise 5.03: Determining the Annual Loss Expected to Occur from Risks
Exercise 5.04: Alternate Sites
Exercise 5.05: Using Tools to View Volatile Data in Memory
Exercise 5.06: Acquiring Evidence Using EnCase
Chapter 6: Cryptography
Exercise 6.01: Cracking an NT Password Hash
Exercise 6.02: Binary Math with XOR
Exercise 6.02: Reviewing a Digital Certificate
Chapter 7: Data Communications
Exercise 7.01: ARP Spoofing
Chapter 8: Malicious Code and Malware
Exercise 8.01: Creating a Professional Virus Report
Exercise 8.02: Performing a Ping of Death Attack
Exercise 8.03: Capturing FTP with a Sniffer
Previous page
Table of content
Next page
SSCP Study Guide and DVD Training System
ISBN: 1931836809
EAN: 2147483647
Year: 2003
Pages: 135
Authors:
Jeffrey Posulns
,
Robert J. Shimonski
,
Jeremy Faircloth
BUY ON AMAZON
Project Management JumpStart
Building the Foundation
Breaking Down the Project Activities
Planning and Acquiring Resources
Assessing Risk
Controlling the Project Outcome
Agile Project Management: Creating Innovative Products (2nd Edition)
Envision Summary
Practice: Daily Team Integration Meetings
Practice: Participatory Decision Making
An Achilles Heel?
Self-Organization Extensions
Inside Network Security Assessment: Guarding Your IT Infrastructure
The Goals and Objectives of a Risk Assessment
Risk-Assessment Terminology
A Brief History of Security Tools
Determining the Next Step
IT Security Architecture and Framework
Secure Programming Cookbook for C and C++: Recipes for Cryptography, Authentication, Input Validation & More
Defining Constrained Value Types
Overloading the Increment and Decrement Operators
Introduction
Introduction
Manipulating an XML Document
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hacks 1016: Introduction
Hack 33. Why Your Cell Phone Doesnt Work There
Hack 44. You Got Your A9 Local in My Google Maps!
Hack 50. Geoblog with Google Maps in Thingster
Hacks 5161: Introduction
Quantitative Methods in Project Management
Introduction to Probability and Statistics for Projects
Organizing and Estimating the Work
Quantitative Time Management
Special Topics in Quantitative Management
Quantitative Methods in Project Contracts
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies