bookmate game
en
Matt Walker

CEH Certified Ethical Hacker Practice Exams, Fourth Edition, 4th Edition

Benachrichtigen, wenn das Buch hinzugefügt wird
Um dieses Buch zu lesen laden Sie eine EPUB- oder FB2-Datei zu Bookmate hoch. Wie lade ich ein Buch hoch?
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Don’t Let the Real Test Be Your First Test!
Fully updated for the CEH v10 exam objectives, this practical guide contains more than 600 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment test evaluates your readiness and identifies areas requiring further study. Designed to help you pass the exam, this is the perfect companion to CEH™ Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition.
Covers all exam topics, including:
•Ethical hacking fundamentals•Reconnaissance and footprinting•Scanning and enumeration•Sniffing and evasion•Attacking a system•Hacking web servers and applications•Wireless network hacking•Mobile and IoT•Security in cloud computing•Trojans and other attacks•Cryptography•Social engineering and physical security•Penetration testing
Online content includes:
•Test engine that provides full-length practice exams and customized quizzes by chapter or exam domain
Dieses Buch ist zurzeit nicht verfügbar
543 Druckseiten
Haben Sie es bereits gelesen? Was halten sie davon?
👍👎

Zitate

  • b7510226800hat Zitat gemachtvor 4 Jahren
    wrapper is used to bind a Trojan and a legitimate program together so the Trojan will be installed when the legitimate program is executed.
  • b7510226800hat Zitat gemachtvor 4 Jahren
    crypter is a software tool that uses a combination of encryption and code manipulation to render malware undetectable to AV and other security monitoring products
  • b7510226800hat Zitat gemachtvor 4 Jahren
    session splicing is an IDS evasion method.
fb2epub
Ziehen Sie Ihre Dateien herüber (nicht mehr als fünf auf einmal)