AccueilGroupesDiscussionsPlusTendances
Site de recherche
Ce site utilise des cookies pour fournir nos services, optimiser les performances, pour les analyses, et (si vous n'êtes pas connecté) pour les publicités. En utilisant Librarything, vous reconnaissez avoir lu et compris nos conditions générales d'utilisation et de services. Votre utilisation du site et de ses services vaut acceptation de ces conditions et termes.

Résultats trouvés sur Google Books

Cliquer sur une vignette pour aller sur Google Books.

Chargement...

Certified Ethical Hacker (CEH) Version 9 Cert Guide (2nd Edition) (Certification Guide)

par Michael Gregg

MembresCritiquesPopularitéÉvaluation moyenneDiscussions
2Aucun5,255,817AucunAucun
In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael's concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. ·         Every feature of this book supports both efficient exam preparation and long-term mastery: ·         Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives ·         Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success ·         Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career ·         Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including ·         Ethical hacking basics ·         Technical foundations of hacking ·         Footprinting and scanning ·         Enumeration and system hacking ·         Linux distro's, such as Kali and automated assessment tools ·         Trojans and backdoors ·         Sniffers, session hijacking, and denial of service ·         Web server hacking, web applications, and database attacks ·         Wireless technologies, mobile security, and mobile attacks ·         IDS, firewalls, and honeypots ·         Buffer overflows, viruses, and worms ·         Cryptographic attacks and defenses ·         Cloud security and social engineering  … (plus d'informations)
Récemment ajouté parbrownfamilylibrary, rameinstein
Aucun
Chargement...

Inscrivez-vous à LibraryThing pour découvrir si vous aimerez ce livre

Actuellement, il n'y a pas de discussions au sujet de ce livre.

Aucune critique
aucune critique | ajouter une critique
Vous devez vous identifier pour modifier le Partage des connaissances.
Pour plus d'aide, voir la page Aide sur le Partage des connaissances [en anglais].
Titre canonique
Titre original
Titres alternatifs
Date de première publication
Personnes ou personnages
Lieux importants
Évènements importants
Films connexes
Épigraphe
Dédicace
Premiers mots
Citations
Derniers mots
Notice de désambigüisation
Directeur de publication
Courtes éloges de critiques
Langue d'origine
DDC/MDS canonique
LCC canonique

Références à cette œuvre sur des ressources externes.

Wikipédia en anglais

Aucun

In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael's concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. ·         Every feature of this book supports both efficient exam preparation and long-term mastery: ·         Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives ·         Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success ·         Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career ·         Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including ·         Ethical hacking basics ·         Technical foundations of hacking ·         Footprinting and scanning ·         Enumeration and system hacking ·         Linux distro's, such as Kali and automated assessment tools ·         Trojans and backdoors ·         Sniffers, session hijacking, and denial of service ·         Web server hacking, web applications, and database attacks ·         Wireless technologies, mobile security, and mobile attacks ·         IDS, firewalls, and honeypots ·         Buffer overflows, viruses, and worms ·         Cryptographic attacks and defenses ·         Cloud security and social engineering  

Aucune description trouvée dans une bibliothèque

Description du livre
Résumé sous forme de haïku

Discussion en cours

Aucun

Couvertures populaires

Vos raccourcis

Évaluation

Moyenne: Pas d'évaluation.

Est-ce vous ?

Devenez un(e) auteur LibraryThing.

 

À propos | Contact | LibraryThing.com | Respect de la vie privée et règles d'utilisation | Aide/FAQ | Blog | Boutique | APIs | TinyCat | Bibliothèques historiques | Critiques en avant-première | Partage des connaissances | 204,771,138 livres! | Barre supérieure: Toujours visible