Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

Buy
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for acquiring the necessary knowledge to prepare for and pass the CEH exam, this book offers clear, concise, and easy-to-understand explanations of key ethical hacking topics as well as hundreds of review questions. Krutz and Vines equip you with in-depth coverage of the latest hacking techniques you'll need to know in order to pass the qualifying examinations, and they arm you with both offensive and defensive approaches to help organizations identify vulnerabilities and protect their information systems.

In addition to its technical content, The CEH Prep Guide examines the legal and ethical requirements and ramifications that are associated with ethical hacking, the rationale behind it, relevant technologies and terminology, and the increased professional responsibility that accompanies the CEH certification. You'll get essential information on penetration testing, vulnerability analysis, risk mitigation, countermeasures, and upgrading defenses in an effective and cost-efficient manner. Plus, the knowledge gained from this guide is applicable to commercial, industrial, military, and government organizations. Greatly increasing your chances of success when taking the CEH exam, The CEH Prep Guide also covers:

  • Footprinting, scanning, and enumeration
  • Trojans, backdoors, and sniffers

  • Denial of service and social engineering

  • Linux hacking, cryptography, and buffer overflows

  • Honeypots, firewalls, viruses, and worms

  • Web application vulnerabilities and Web-based password cracking techniques

The accompanying CD-ROM features hundreds of questions and answers, and also serves as a self-paced examination review and knowledge reinforcement tool.

About the Author

RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series.

RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE, MCNE, is Chief Security Advisor for Gotham Technology Group, LLC. He is the author or coauthor of numerous bestselling information system security publications, and is a consulting editor for John Wiley and Sons for its information security book series.

(HTML tags aren't allowed.)

Hybrid Video Compression Standard (SpringerBriefs in Applied Sciences and Technology)
Hybrid Video Compression Standard (SpringerBriefs in Applied Sciences and Technology)
The usage of social media and sharing of multimedia content over the Internet are rapidly increasing in recent time. Various facilities such as sharing of videos, downloading and viewing them, and videoconferencing based on the Internet are routine in the modern lifestyle. These all applications are consuming high...
Workflows: Expanding Architecture's Territory in the Design and Delivery of Buildings (Architectural Design)
Workflows: Expanding Architecture's Territory in the Design and Delivery of Buildings (Architectural Design)

Workflows are being rethought and remodelled across the architecture, engineering and construction (AEC) spectrum. The synthesis of building information modelling (BIM) platforms with digital simulation techniques and increasing access to data, charting building performance, is allowing architects to engage in the generation of new workflows...

Myeloid Leukemia: Methods and Protocols (Methods in Molecular Medicine)
Myeloid Leukemia: Methods and Protocols (Methods in Molecular Medicine)

A panel of internationally recognized research scientists and clinical investigators brings together a diverse collection of readily reproducible methods for identifying and quantifying a large number of specific genetic abnormalities associated with the broad spectrum of myeloid malignancies. Highlights include techniques for the detection...


Principles of Bacterial Pathogenesis
Principles of Bacterial Pathogenesis

Principles of Bacterial Pathogenesis presents a molecular perspective on a select group of bacterial pathogens by having the leaders of the field present their perspective in a clear and authoritative manner. Each chapter contains a comprehensive review devoted to a single pathogen. Several chapters include work from authors outside...

The Art of Computer Programming. Vol 1: Fundamental Algorithms. 2nd Printing.
The Art of Computer Programming. Vol 1: Fundamental Algorithms. 2nd Printing.

Fundamental Algorithms begins with mathematical preliminaries. The first section offers a good grounding in a variety of useful mathematical tools: proof techniques, combinatorics, and elementary number theory. Knuth then details the MIX processor, a virtual machine architecture that serves as the programming target for subsequent...

Intermodulation Distortion in Microwave and Wireless Circuits (Artech House Microwave Library)
Intermodulation Distortion in Microwave and Wireless Circuits (Artech House Microwave Library)

This unique new book is your single resource for all issues related to intermodulation and multi-tone distortion in microwave and wireless circuits. Beginning with an overview of the general concepts of distortion in microwave and wireless devices, it delves into the theory and practical aspects of nonlinear distortion, tools for nonlinear...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy