14.11.2012 Views

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

CEHv6 Resource Guide.indd - Algebra

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

http://www.eccouncil.org<br />

• Biometric Identifi cation Techniques<br />

• Authentication Mechanisms<br />

• Authentication Mechanism Challenges: Biometrics<br />

• Faking Fingerprints<br />

• Smart cards<br />

• Security Token<br />

• Computer Equipment Maintenance<br />

• Wiretapping<br />

• Remote Access<br />

• Lapse of Physical Security<br />

• Locks<br />

� Information Security<br />

� Lock Picking<br />

� Lock Picking Tools<br />

� EPS (Electronic Physical Security)<br />

� Wireless Security<br />

� Laptop Theft Statistics for 2007<br />

� Statistics for Stolen and Recovered Laptops<br />

� Laptop Theft<br />

� Laptop theft: Data Under Loss<br />

� Laptop Security Tools<br />

� Laptop Tracker - XTool Computer Tracker<br />

� Tools to Locate Stolen Laptops<br />

� Stop's Unique, Tamper-proof Patented Plate<br />

� Tool: TrueCrypt<br />

EC-Council<br />

Page 75

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!