000 | 04439cam a2200613Ia 4500 | ||
---|---|---|---|
001 | 12679751 | ||
003 | OSt | ||
005 | 20190522143841.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 100602s2010 inua ob 001 0 eng d | ||
020 | _a9781119252245 | ||
020 | _z0470525207 | ||
024 | 8 |
_a9786612683503 _c4742.00 |
|
035 | _a(OCoLC)ocn635955021 | ||
035 | _a(NNC)12679751 | ||
035 |
_a(OCoLC)635955021 _z(OCoLC)646133940 _z(OCoLC)647922465 _z(OCoLC)658182903 _z(OCoLC)712989498 _z(OCoLC)748599828 _z(OCoLC)776986532 _z(OCoLC)781396683 _z(OCoLC)816567240 _z(OCoLC)961539030 _z(OCoLC)961973301 _z(OCoLC)962607230 _z(OCoLC)988457683 _z(OCoLC)992033318 |
||
037 |
_aCL0500000071 _bSafari Books Online |
||
037 |
_a845F40B0-1C37-4F71-B3F3-483CC1E631C3 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
040 |
_aN$T _beng _epn _cAUI _dUMI _dCEF _dE7B _dCDX _dOCLCQ _dCOO _dEBLCP _dMHW _dOCLCQ _dFVL _dB24X7 _dOCLCQ _dDEBSZ _dTEFOD _dOCLCQ _dYDXCP _dOCLCA _dOCLCQ _dOCLCO _dMBB _dT2N _dAU@ _dIDEBK _dOCLCO _dDEBBG _dTEFOD _dOCLCQ _dOCLCO _dOCLCQ _dOCLCO _dAZK _dOCLCO _dCNNOR _dZ5A _dMOR _dPIFAG _dZCU _dLIV _dOCLCQ _dMERUC _dOCLCQ _dU3W _dOCLCA _dOCLCF |
||
049 | _aZCUA | ||
050 | 4 |
_aQA76.3 _b.G6875 2010eb |
|
072 | 7 |
_aCOM _x060040 _2bisacsh |
|
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _222 |
100 | 1 |
_aOriyano,Sean Philip _d1974- _93844 |
|
245 | 1 | 0 |
_aCEH V9 _bcertified ethical hacker study guide / |
260 |
_aIndianapolis _bSYBEX _c2016. |
||
300 |
_axxxii;607 p. _billustrations. |
||
490 | 1 | _aSybex serious skills | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | 0 |
_tAt a Glance -- _tTable of Exercises -- _tIntroduction -- _tAssessment Test -- _tAnswers to Assessment Test -- _g1. _t: Introduction to Ethical Hacking, Ethics, and Legality -- _g2. _t: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering -- _g3. _t: Gathering Network and Host Information: Scanning and Enumeration -- _g4. _t: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files -- _g5. _t: Trojans, Backdoors, Viruses, and Worms -- _g6. _t: Gathering Data from Networks: Sniffers -- _g7. _t: Denial of Service and Session Hijacking -- _g8. _t: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques -- _g9. _t: Attacking Applications: SQL Injection and Buffer Overflows -- _g10. _t: Wireless Network Hacking -- _g11. _t: Physical Site Security -- _g12. _t: Hacking Linux Systems -- _g13. _t: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls -- _g14. _t: Cryptography -- _g15. _t: Performing a Penetration Test -- _tAppendix: About the Companion CD. |
520 | _aPrepare for the new version of CEH certification with this advanced guide. Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice.:; Covers eth. | ||
650 | 0 |
_aElectronic data processing personnel _xCertification. _93845 |
|
650 | 0 |
_aComputer security _xExaminations _vStudy guides. _93846 |
|
650 | 0 |
_aHackers _xExaminations _vStudy guides. _93847 |
|
650 | 0 |
_aComputer networks _xExaminations _vStudy guides. _93848 |
|
650 | 7 |
_aCOMPUTERS _xInternet _xSecurity. _2bisacsh _93849 |
|
650 | 7 |
_aCOMPUTERS _xNetworking _xSecurity. _2bisacsh _93850 |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xGeneral. _2bisacsh _93851 |
|
650 | 7 |
_aComputer networks _xExaminations. _2fast _93852 |
|
650 | 7 |
_aComputer security _xExaminations. _2fast _93853 |
|
650 | 7 |
_aElectronic data processing personnel _xCertification. _2fast _93854 |
|
655 | 4 |
_aElectronic books. _93855 |
|
655 | 7 |
_aStudy guides. _2fast _93856 |
|
776 | 0 | 8 |
_iPrint version: _aGraves, Kimberly, 1974- _tCEH. _dIndianapolis, Ind. : Wiley Pub., �2010 _z9780470525203 _w(DLC) 2010003135 _w(OCoLC)426814058 |
830 | 0 |
_aSerious skills. _93857 |
|
856 | 4 | 0 |
_uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio12679751 _zEbook Central Academic Complete |
942 |
_2ddc _cBK |
||
990 | _aQA | ||
999 |
_c12641 _d12641 |