語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Certified Ethical Hacker (CEH) Found...
~
SpringerLink (Online service)
Certified Ethical Hacker (CEH) Foundation Guide
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Certified Ethical Hacker (CEH) Foundation Guide/ by Sagar Ajay Rahalkar.
作者:
Rahalkar, Sagar Ajay.
面頁冊數:
XXIII, 198 p. 68 illus., 58 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Data protection. -
電子資源:
https://doi.org/10.1007/978-1-4842-2325-3
ISBN:
9781484223253
Certified Ethical Hacker (CEH) Foundation Guide
Rahalkar, Sagar Ajay.
Certified Ethical Hacker (CEH) Foundation Guide
[electronic resource] /by Sagar Ajay Rahalkar. - 1st ed. 2016. - XXIII, 198 p. 68 illus., 58 illus. in color.online resource.
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. In this book you will: Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker.
ISBN: 9781484223253
Standard No.: 10.1007/978-1-4842-2325-3doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Certified Ethical Hacker (CEH) Foundation Guide
LDR
:02611nam a22003735i 4500
001
974371
003
DE-He213
005
20200702132036.0
007
cr nn 008mamaa
008
201211s2016 xxu| s |||| 0|eng d
020
$a
9781484223253
$9
978-1-4842-2325-3
024
7
$a
10.1007/978-1-4842-2325-3
$2
doi
035
$a
978-1-4842-2325-3
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Rahalkar, Sagar Ajay.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1115976
245
1 0
$a
Certified Ethical Hacker (CEH) Foundation Guide
$h
[electronic resource] /
$c
by Sagar Ajay Rahalkar.
250
$a
1st ed. 2016.
264
1
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
XXIII, 198 p. 68 illus., 58 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
520
$a
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. In this book you will: Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker.
650
0
$a
Data protection.
$3
557764
650
0
$a
Computer security.
$3
557122
650
1 4
$a
Security.
$3
1114130
650
2 4
$a
Systems and Data Security.
$3
677062
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9781484223246
776
0 8
$i
Printed edition:
$z
9781484223260
856
4 0
$u
https://doi.org/10.1007/978-1-4842-2325-3
912
$a
ZDB-2-CWD
912
$a
ZDB-2-SXPC
950
$a
Professional and Applied Computing (SpringerNature-12059)
950
$a
Professional and Applied Computing (R0) (SpringerNature-43716)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入