Cargando…

CEH: certified ethical hacker : version 8 : study guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-...

Descripción completa

Detalles Bibliográficos
Autor principal: Oriyano, Sean-Philip
Lenguaje:eng
Publicado: Wiley 2014
Materias:
Acceso en línea:http://cds.cern.ch/record/1748582
_version_ 1780943012571906048
author Oriyano, Sean-Philip
author_facet Oriyano, Sean-Philip
author_sort Oriyano, Sean-Philip
collection CERN
description Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and muc
id cern-1748582
institution Organización Europea para la Investigación Nuclear
language eng
publishDate 2014
publisher Wiley
record_format invenio
spelling cern-17485822021-04-21T20:55:23Zhttp://cds.cern.ch/record/1748582engOriyano, Sean-PhilipCEH: certified ethical hacker : version 8 : study guideComputing and ComputersPrepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and mucWileyoai:cds.cern.ch:17485822014
spellingShingle Computing and Computers
Oriyano, Sean-Philip
CEH: certified ethical hacker : version 8 : study guide
title CEH: certified ethical hacker : version 8 : study guide
title_full CEH: certified ethical hacker : version 8 : study guide
title_fullStr CEH: certified ethical hacker : version 8 : study guide
title_full_unstemmed CEH: certified ethical hacker : version 8 : study guide
title_short CEH: certified ethical hacker : version 8 : study guide
title_sort ceh: certified ethical hacker : version 8 : study guide
topic Computing and Computers
url http://cds.cern.ch/record/1748582
work_keys_str_mv AT oriyanoseanphilip cehcertifiedethicalhackerversion8studyguide