語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Certified Ethical Hacker (CEH) Found...
~
Rahalkar, Sagar Ajay.
FindBook
Google Book
Amazon
博客來
Certified Ethical Hacker (CEH) Foundation Guide
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Certified Ethical Hacker (CEH) Foundation Guide/ by Sagar Ajay Rahalkar.
作者:
Rahalkar, Sagar Ajay.
出版者:
Berkeley, CA :Apress : : 2016.,
面頁冊數:
xxiii, 198 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
標題:
Hacking - Moral and ethical aspects. -
電子資源:
http://dx.doi.org/10.1007/978-1-4842-2325-3
ISBN:
9781484223253
Certified Ethical Hacker (CEH) Foundation Guide
Rahalkar, Sagar Ajay.
Certified Ethical Hacker (CEH) Foundation Guide
[electronic resource] /by Sagar Ajay Rahalkar. - Berkeley, CA :Apress :2016. - xxiii, 198 p. :ill., digital ;24 cm.
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. In this book you will: Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker.
ISBN: 9781484223253
Standard No.: 10.1007/978-1-4842-2325-3doiSubjects--Topical Terms:
3201319
Hacking
--Moral and ethical aspects.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.87
Certified Ethical Hacker (CEH) Foundation Guide
LDR
:02196nmm a2200277 a 4500
001
2080934
003
DE-He213
005
20161130115352.0
006
m d
007
cr nn 008maaau
008
170616s2016 cau s 0 eng d
020
$a
9781484223253
$q
(electronic bk.)
020
$a
9781484223246
$q
(paper)
024
7
$a
10.1007/978-1-4842-2325-3
$2
doi
035
$a
978-1-4842-2325-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
082
0 4
$a
005.87
$2
23
090
$a
QA76.9.A25
$b
R147 2016
100
1
$a
Rahalkar, Sagar Ajay.
$3
3201318
245
1 0
$a
Certified Ethical Hacker (CEH) Foundation Guide
$h
[electronic resource] /
$c
by Sagar Ajay Rahalkar.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
xxiii, 198 p. :
$b
ill., digital ;
$c
24 cm.
520
$a
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker. The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course. In this book you will: Gain the basics of hacking (apps, wireless devices, and mobile platforms) Discover useful aspects of databases and operating systems from a hacking perspective Develop sharper programming and networking skills for the exam Explore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypots Grasp the key concepts of cryptography Discover the career paths available after certification Revise key interview questions for a certified ethical hacker.
650
0
$a
Hacking
$x
Moral and ethical aspects.
$3
3201319
650
0
$a
Computer science.
$3
523869
650
0
$a
Computer security
$x
Moral and ethical aspects.
$3
855543
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Security.
$3
3134865
650
2 4
$a
Systems and Data Security.
$3
898223
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-2325-3
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9312815
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25 R147 2016
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入