CEH v9: Certified ethical hacker version 9, study guide
The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Sybex
[2016]
|
Schlagworte: | |
Online-Zugang: | FHA01 FRO01 UBG01 UBT01 UBY01 Volltext |
Zusammenfassung: | The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. -Review all CEH v9 topics systematically -Reinforce critical skills with hands-on exercises -Learn how concepts apply in real-world scenarios -Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam-making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors |
Beschreibung: | Introduction to Ethical Hacking -- System Fundamentals -- Cryptography -- Footprinting -- Scanning -- Enumeration -- System Hacking -- Malware -- Sniffers -- Social Engineering -- Denial of Service -- Session Hijacking -- Web Servers and Applications -- SQL Injection -- Hacking Wi-Fi and Bluetooth -- Mobile Device Security -- Evasion -- Cloud Technologies and Security -- Physical Security -- Comprehensive Online Learning Environment |
Beschreibung: | 1 Online-Ressource (607 Seiten) |
ISBN: | 9781119419303 9781119252276 9781119252252 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044453352 | ||
003 | DE-604 | ||
005 | 20200309 | ||
007 | cr|uuu---uuuuu | ||
008 | 170818s2016 |||| o||u| ||||||eng d | ||
015 | |a GBB740806 |2 dnb | ||
020 | |a 9781119419303 |c Online |9 9781119419303 | ||
020 | |a 9781119252276 |9 9781119252276 | ||
020 | |a 9781119252252 |9 9781119252252 | ||
024 | 7 | |a 10.1002/9781119419303 |2 doi | |
035 | |a (OCoLC)1002257728 | ||
035 | |a (DE-599)BVBBV044453352 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-Aug4 |a DE-706 |a DE-861 |a DE-703 | ||
082 | 0 | |a 005.8 | |
100 | 1 | |a Oriyano, Sean-Philip |e Verfasser |0 (DE-588)1127754688 |4 aut | |
245 | 1 | 0 | |a CEH v9 |b Certified ethical hacker version 9, study guide |c Sean-Philip Oriyano |
264 | 1 | |a Indianapolis, IN |b Sybex |c [2016] | |
264 | 4 | |c © 2016 | |
300 | |a 1 Online-Ressource (607 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Introduction to Ethical Hacking -- System Fundamentals -- Cryptography -- Footprinting -- Scanning -- Enumeration -- System Hacking -- Malware -- Sniffers -- Social Engineering -- Denial of Service -- Session Hijacking -- Web Servers and Applications -- SQL Injection -- Hacking Wi-Fi and Bluetooth -- Mobile Device Security -- Evasion -- Cloud Technologies and Security -- Physical Security -- Comprehensive Online Learning Environment | ||
520 | |a The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. -Review all CEH v9 topics systematically -Reinforce critical skills with hands-on exercises -Learn how concepts apply in real-world scenarios -Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam-making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors | ||
650 | 4 | |a COMPUTERS / Security / General / bisacsh | |
650 | 4 | |a Computer security / Examinations / Study guides | |
650 | 4 | |a Penetration testing (Computer security) / Examinations / Study guides | |
650 | 4 | |a Computer networks / Examinations / Study guides | |
650 | 4 | |a Electronic data processing personnel / Certification | |
650 | 4 | |a Hackers / Certification | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119252245 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-35-WIC | ||
940 | 1 | |q UBG_PDA_WIC | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029854212 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 |l FRO01 |p ZDB-35-WIC |q FRO_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 |l UBG01 |p ZDB-35-WIC |q UBG_PDA_WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 |l UBT01 |p ZDB-35-WIC |q UBT_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804177771049517056 |
---|---|
any_adam_object | |
author | Oriyano, Sean-Philip |
author_GND | (DE-588)1127754688 |
author_facet | Oriyano, Sean-Philip |
author_role | aut |
author_sort | Oriyano, Sean-Philip |
author_variant | s p o spo |
building | Verbundindex |
bvnumber | BV044453352 |
collection | ZDB-35-WIC |
ctrlnum | (OCoLC)1002257728 (DE-599)BVBBV044453352 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04685nmm a2200529 c 4500</leader><controlfield tag="001">BV044453352</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200309 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">170818s2016 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB740806</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119419303</subfield><subfield code="c">Online</subfield><subfield code="9">9781119419303</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119252276</subfield><subfield code="9">9781119252276</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119252252</subfield><subfield code="9">9781119252252</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119419303</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002257728</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044453352</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean-Philip</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1127754688</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CEH v9</subfield><subfield code="b">Certified ethical hacker version 9, study guide</subfield><subfield code="c">Sean-Philip Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Sybex</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (607 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction to Ethical Hacking -- System Fundamentals -- Cryptography -- Footprinting -- Scanning -- Enumeration -- System Hacking -- Malware -- Sniffers -- Social Engineering -- Denial of Service -- Session Hijacking -- Web Servers and Applications -- SQL Injection -- Hacking Wi-Fi and Bluetooth -- Mobile Device Security -- Evasion -- Cloud Technologies and Security -- Physical Security -- Comprehensive Online Learning Environment</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. -Review all CEH v9 topics systematically -Reinforce critical skills with hands-on exercises -Learn how concepts apply in real-world scenarios -Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam-making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS / Security / General / bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security / Examinations / Study guides</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security) / Examinations / Study guides</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Examinations / Study guides</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic data processing personnel / Certification</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers / Certification</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119252245</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">UBG_PDA_WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029854212</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FRO_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBG_PDA_WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBT_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044453352 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:53:22Z |
institution | BVB |
isbn | 9781119419303 9781119252276 9781119252252 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029854212 |
oclc_num | 1002257728 |
open_access_boolean | |
owner | DE-Aug4 DE-706 DE-861 DE-703 |
owner_facet | DE-Aug4 DE-706 DE-861 DE-703 |
physical | 1 Online-Ressource (607 Seiten) |
psigel | ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC FRO_PDA_WIC ZDB-35-WIC UBG_PDA_WIC ZDB-35-WIC UBT_PDA_WIC_Kauf ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Sybex |
record_format | marc |
spelling | Oriyano, Sean-Philip Verfasser (DE-588)1127754688 aut CEH v9 Certified ethical hacker version 9, study guide Sean-Philip Oriyano Indianapolis, IN Sybex [2016] © 2016 1 Online-Ressource (607 Seiten) txt rdacontent c rdamedia cr rdacarrier Introduction to Ethical Hacking -- System Fundamentals -- Cryptography -- Footprinting -- Scanning -- Enumeration -- System Hacking -- Malware -- Sniffers -- Social Engineering -- Denial of Service -- Session Hijacking -- Web Servers and Applications -- SQL Injection -- Hacking Wi-Fi and Bluetooth -- Mobile Device Security -- Evasion -- Cloud Technologies and Security -- Physical Security -- Comprehensive Online Learning Environment The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. -Review all CEH v9 topics systematically -Reinforce critical skills with hands-on exercises -Learn how concepts apply in real-world scenarios -Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam-making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors COMPUTERS / Security / General / bisacsh Computer security / Examinations / Study guides Penetration testing (Computer security) / Examinations / Study guides Computer networks / Examinations / Study guides Electronic data processing personnel / Certification Hackers / Certification Erscheint auch als Druck-Ausgabe 9781119252245 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Oriyano, Sean-Philip CEH v9 Certified ethical hacker version 9, study guide COMPUTERS / Security / General / bisacsh Computer security / Examinations / Study guides Penetration testing (Computer security) / Examinations / Study guides Computer networks / Examinations / Study guides Electronic data processing personnel / Certification Hackers / Certification |
title | CEH v9 Certified ethical hacker version 9, study guide |
title_auth | CEH v9 Certified ethical hacker version 9, study guide |
title_exact_search | CEH v9 Certified ethical hacker version 9, study guide |
title_full | CEH v9 Certified ethical hacker version 9, study guide Sean-Philip Oriyano |
title_fullStr | CEH v9 Certified ethical hacker version 9, study guide Sean-Philip Oriyano |
title_full_unstemmed | CEH v9 Certified ethical hacker version 9, study guide Sean-Philip Oriyano |
title_short | CEH v9 |
title_sort | ceh v9 certified ethical hacker version 9 study guide |
title_sub | Certified ethical hacker version 9, study guide |
topic | COMPUTERS / Security / General / bisacsh Computer security / Examinations / Study guides Penetration testing (Computer security) / Examinations / Study guides Computer networks / Examinations / Study guides Electronic data processing personnel / Certification Hackers / Certification |
topic_facet | COMPUTERS / Security / General / bisacsh Computer security / Examinations / Study guides Penetration testing (Computer security) / Examinations / Study guides Computer networks / Examinations / Study guides Electronic data processing personnel / Certification Hackers / Certification |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303 |
work_keys_str_mv | AT oriyanoseanphilip cehv9certifiedethicalhackerversion9studyguide |