Für diesen Artikel ist leider kein Bild verfügbar.

CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition

(Autor)

Buch
464 Seiten
2016 | 3rd edition
McGraw-Hill Education (Verlag)
978-1-259-83655-8 (ISBN)
41,55 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Fully up-to-date coverage of every topic on the CEH v9 certification exam

Thoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools, techniques, and exploits relevant to the CEH exam. Readers will find learning objectives at the beginning of each chapter, exam tips, end-of-chapter reviews, and practice exam questions with in-depth answer explanations.

An integrated study system based on proven pedagogy, CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition, features brand-new explanations of cloud computing and mobile platforms and addresses vulnerabilities to the latest technologies and operating systems. Readers will learn about footprinting and reconnaissance, malware, hacking Web applications and mobile platforms, cloud computing vulnerabilities, and much more. Designed to help you pass the exam with ease, this authoritative resource will also serve as an essential on-the-job reference.



Features more than 400 accurate practice questions, including new performance-based questions Electronic content includes 2 complete practice exams and a PDF copy of the book Written by an experienced educator with more than 30 years of experience in the field

Matt Walker, CCNA, CCNP, MCSE, CEH, CNDA, CPTS (Satellite Beach, FL) is an IT Security Architect for HP at Kennedy Space Center. He has held a variety of networking and IT Security positions, most recently including the IT Security Manager positions at Marshall Space Flight Center (SAIC contract) and Kennedy Space Center (Lockheed Martin contract).

Chapter 1: Getting Started: Essential Knowledge
Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 3: Scanning and Enumeration
Chapter 4: Sniffing and Evasion
Chapter 5: Attacking a System
Chapter 6: Web-Based Hacking: Servers and Applications
Chapter 7: Wireless Network Hacking
Chapter 8: Security in Cloud Computing
Chapter 9: Trojan and Other Attacks
Chapter 10: Cryptography 101
Chapter 11: Low Tech: Social Engineering and Physical Security
Chapter 12: The Pen Test: Putting It All Together
Appendix A: Tools, Sites, and References
Glossary

Erscheinungsdatum
Verlagsort OH
Sprache englisch
Maße 188 x 231 mm
Gewicht 787 g
Themenwelt Sonstiges Geschenkbücher
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management
ISBN-10 1-259-83655-X / 125983655X
ISBN-13 978-1-259-83655-8 / 9781259836558
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich