Check nearby libraries
Buy this book
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests Note: CD-ROM/DVD and other supplementary materials are not included.
Check nearby libraries
Buy this book
Subjects
Computer Technology, Nonfiction, Computer security, HackersShowing 1 featured edition. View all 1 editions?
Edition | Availability |
---|---|
1 |
aaaa
Libraries near you:
WorldCat
|
Book Details
Edition Notes
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?August 21, 2020 | Edited by ImportBot | import existing book |
July 22, 2019 | Edited by MARC Bot | remove fake subjects |
September 10, 2011 | Edited by Mojo | merge authors |
June 30, 2010 | Created by ImportBot | new OverDrive book |