Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you'll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.About the Author:
Kimberly Graves, CEH, CWSP, CWNP, and CWNA, has over ten years of IT experience. She currently works as an instructor with Symbol Technologies and other leading wireless and security vendors. She has served as subject matter expert for several certification programs, including the Certified Wireless Network Professional (CWNP) and Intel Certified Network Engineer.
"Sobre este título" puede pertenecer a otra edición de este libro.
Descripción 2007. Soft cover. Estado de conservación: New. No Jacket. This book is BRAND NEW Soft cover International edition with black and white printing. ISBN number & cover page may be different but contents identical to the US edition word by word. Book is in English language. Nº de ref. de la librería UBS-wiley-020
Descripción Sybex, 2007. Paperback. Estado de conservación: New. PAP/CDR RE. Nº de ref. de la librería DADAX0782144373
Descripción Sybex. PAPERBACK. Estado de conservación: New. 0782144373 New. Looks like an interesting title! We provide domestic tracking upon request, provide personalized customer service and want you to have a great experience purchasing from us. 100% satisfaction guaranteed and thank you for your consideration. Nº de ref. de la librería M-0782144373
Descripción Sybex, 2007. Paperback. Estado de conservación: New. Nº de ref. de la librería P110782144373
Descripción Sybex. PAPERBACK. Estado de conservación: New. 0782144373 New Condition. Nº de ref. de la librería NEW4.0421349
Descripción Sybex, 2007. Estado de conservación: New. Brand New, Unread Copy in Perfect Condition. A+ Customer Service! Summary: Introduction. Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality. Chapter 2: Footprinting and Social Engineering. Chapter 3: Scanning and Enumeration. Chapter 4: System Hacking. Chapter 5: Trojans, Backdoors, Viruses, and Worms. Chapter 6: Sniffers. Chapter 7: Denial of Service and Session Hijacking. Chapter 8: Hacking Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques. Chapter 9: SQL Injection and Buffer Overflows. Chapter 10: Wireless Hacking. Chapter 11: Physical Security. Chapter 12: Linux Hacking. Chapter 13: Evading IDSs, Honeypots, and Firewalls. Chapter 14: Cryptography. Chapter 15: Penetration Testing Methodologies. Glossary. Index. Nº de ref. de la librería ABE_book_new_0782144373
Descripción Sybex, 2007. Paperback. Estado de conservación: New. book. Nº de ref. de la librería 0782144373