Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Certified Ethical Hacker (CEH) Found...
~
Rahalkar, Sagar Ajay.
Certified Ethical Hacker (CEH) Foundation Guide
Record Type:
Electronic resources : Monograph/item
Title/Author:
Certified Ethical Hacker (CEH) Foundation Guideby Sagar Ajay Rahalkar.
Author:
Rahalkar, Sagar Ajay.
Published:
Berkeley, CA :Apress :2016.
Description:
xxiii, 198 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
HackingMoral and ethical aspects.
Online resource:
http://dx.doi.org/10.1007/978-1-4842-2325-3
ISBN:
9781484223253$q(electronic bk.)
Certified Ethical Hacker (CEH) Foundation Guide
Rahalkar, Sagar Ajay.
Certified Ethical Hacker (CEH) Foundation Guide
[electronic resource] /by Sagar Ajay Rahalkar. - Berkeley, CA :Apress :2016. - xxiii, 198 p. :ill., digital ;24 cm.
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. In this book you will: Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker.
ISBN: 9781484223253$q(electronic bk.)
Standard No.: 10.1007/978-1-4842-2325-3doiSubjects--Topical Terms:
763338
Hacking
--Moral and ethical aspects.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.87
Certified Ethical Hacker (CEH) Foundation Guide
LDR
:02196nmm a2200277 a 4500
001
500136
003
DE-He213
005
20161130115352.0
006
m d
007
cr nn 008maaau
008
170621s2016 cau s 0 eng d
020
$a
9781484223253$q(electronic bk.)
020
$a
9781484223246$q(paper)
024
7
$a
10.1007/978-1-4842-2325-3
$2
doi
035
$a
978-1-4842-2325-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
082
0 4
$a
005.87
$2
23
090
$a
QA76.9.A25
$b
R147 2016
100
1
$a
Rahalkar, Sagar Ajay.
$3
763337
245
1 0
$a
Certified Ethical Hacker (CEH) Foundation Guide
$h
[electronic resource] /
$c
by Sagar Ajay Rahalkar.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
xxiii, 198 p. :
$b
ill., digital ;
$c
24 cm.
520
$a
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. In this book you will: Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker.
650
0
$a
Hacking
$x
Moral and ethical aspects.
$3
763338
650
0
$a
Computer science.
$3
199325
650
0
$a
Computer security
$x
Moral and ethical aspects.
$3
257569
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Security.
$3
760527
650
2 4
$a
Systems and Data Security.
$3
274481
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-2325-3
950
$a
Professional and Applied Computing (Springer-12059)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000134501
電子館藏
1圖書
電子書
EB QA76.9.A25 R147 2016
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-1-4842-2325-3
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login