Cargando…
CEH: certified ethical hacker : version 8 : study guide
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-...
Autor principal: | |
---|---|
Lenguaje: | eng |
Publicado: |
Wiley
2014
|
Materias: | |
Acceso en línea: | http://cds.cern.ch/record/1748582 |
_version_ | 1780943012571906048 |
---|---|
author | Oriyano, Sean-Philip |
author_facet | Oriyano, Sean-Philip |
author_sort | Oriyano, Sean-Philip |
collection | CERN |
description | Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and muc |
id | cern-1748582 |
institution | Organización Europea para la Investigación Nuclear |
language | eng |
publishDate | 2014 |
publisher | Wiley |
record_format | invenio |
spelling | cern-17485822021-04-21T20:55:23Zhttp://cds.cern.ch/record/1748582engOriyano, Sean-PhilipCEH: certified ethical hacker : version 8 : study guideComputing and ComputersPrepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and mucWileyoai:cds.cern.ch:17485822014 |
spellingShingle | Computing and Computers Oriyano, Sean-Philip CEH: certified ethical hacker : version 8 : study guide |
title | CEH: certified ethical hacker : version 8 : study guide |
title_full | CEH: certified ethical hacker : version 8 : study guide |
title_fullStr | CEH: certified ethical hacker : version 8 : study guide |
title_full_unstemmed | CEH: certified ethical hacker : version 8 : study guide |
title_short | CEH: certified ethical hacker : version 8 : study guide |
title_sort | ceh: certified ethical hacker : version 8 : study guide |
topic | Computing and Computers |
url | http://cds.cern.ch/record/1748582 |
work_keys_str_mv | AT oriyanoseanphilip cehcertifiedethicalhackerversion8studyguide |