Books 2 Byte
CEH: Certified Ethical Hacker Study Guide
Arm yourself against black hats
Which of the following is often one of the most overlooked areas of security: operational, technical, Internet, or physical? What is the name for a person who follows an employee through a locked door without own badge or key: tailgater, follower, visitor, or guest? Which application will help identify whether a Web site is vulnerable to SQL injection attacks: BlackWidow, Metasploit, Scrawlr, or SQL Block? What is the easiest method to get a password: brute-force cracking, guessing, dictionary attack, or hybrid attack? For answers to these and more questions, check CEH: Certified Ethical Hacker Study Guide by Kimberly Graves.