Certified Ethical Hacker (CEH) Cert Guid

Forfatter
Spar {0}
Spar {0} som ARK-VENN
{0} til nettpris
med Klikk&Hent
Format/språk
   Klikk og hent - få varen innen 1 time*
   Alltid bytterett - Norges beste. Bytt uten kvittering.
* Gjelder varer på lager i butikk

Del av serien

Kort om boken

This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CEH v8 exam success with this cert guide from Pearson IT …

Oppdag mer

Velg tagger...

    Om Certified Ethical Hacker (CEH) Cert Guid

    This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CEH v8 exam success with this cert guide from Pearson IT Certification, a leader in IT certification learning. Master CEH exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Certified Ethical Hacker (CEH) Cert Guide is a best-of-breed exam study guide. Leading security consultant and certification expert Michael Gregg shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Youll get a complete test preparation routine organized around proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. This EC-Council authorized study guide helps you master all the topics on the CEH v8 (312-50) exam, including: Ethical hacking basics Technical foundations of hacking Footprinting and scanning Enumeration and system hacking Linux and automated assessment tools Trojans and backdoors Sniffers, session hijacking, and denial of service Web server hacking, web applications, and database attacks Wireless technologies, mobile security, and mobile attacks IDS, firewalls, and honeypots Buffer overflows, viruses, and worms Cryptographic attacks and defenses Physical security and social engineering

    Kundevurderinger

    Totalvurdering: 

    Gi din vurdering: 
    Totalvurdering: 

    Detaljer

    Format
    E-Bok
    Kopisperre
    Teknisk DRM
    Filformat
    ePUB
    Utgivelsesår
    2013
    Forlag
    Pearson Education
    Språk
    Engelsk
    ISBN
    9780133413021
    Sider
    704

    Anbefalt

    Nettleseren din er utdatert

    Mye funksjonalitet på ark.no støttes ikke lenger i Internet Explorer. Vennligst bruk en nyere nettleser.