CEH v10 certified ethical hacker study guide

As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 C...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Messier, Ric (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Indianapolis, Indiana Sybex, a Wiley brand [2019]
Schlagworte:
Online-Zugang:FHA01
FHN01
UBY01
URL des Erstveröffentlichers
Buchcover
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000 c 4500
001 BV046050504
003 DE-604
005 20200504
007 cr|uuu---uuuuu
008 190716s2019 |||| o||u| ||||||eng d
020 |a 9781119533245  |c obook  |9 978-1-119-53324-5 
020 |a 9781119533252  |c ebk  |9 978-1-119-53325-2 
020 |a 9781119533269  |c ebook  |9 978-1-119-53326-9 
024 7 |a 10.1002/9781119533245  |2 doi 
035 |a (OCoLC)1111855634 
035 |a (DE-599)BVBBV046050504 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-92  |a DE-706  |a DE-Aug4 
100 1 |a Messier, Ric  |e Verfasser  |0 (DE-588)1054096732  |4 aut 
245 1 0 |a CEH v10  |b certified ethical hacker study guide  |c Ric Messier, CEH, GCIH, GSEC, CISSP 
246 1 3 |a CEH v10 certified ethical hacker study guide 
264 1 |a Indianapolis, Indiana  |b Sybex, a Wiley brand  |c [2019] 
264 4 |c © 2019 
300 |a 1 Online-Ressource (xxxii, 551 Seiten)  |b Illustrationen, Diagramme 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Includes index 
520 3 |a As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. -Gain a unique certification that allows you to understand the mind of a hacker -Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions -Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security -Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker 
650 0 7 |a Malware  |0 (DE-588)4687059-3  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
650 0 7 |a Computerforensik  |0 (DE-588)4774034-6  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
653 0 |a Computer security / Examinations / Study guides 
653 0 |a Penetration testing (Computer security) / Examinations / Study guides 
653 0 |a Hackers / Examinations / Study guides 
653 0 |a Computer networks / Security measures / Examinations / Study guides 
653 0 |a Electronic data processing personnel / Certification / Study guides 
653 0 |a COMPUTERS / Security / General 
653 0 |a Computer networks / Security measures / Examinations 
653 0 |a Computer security / Examinations 
653 0 |a Electronic data processing personnel / Certification 
653 6 |a Electronic books 
653 6 |a Study guides 
653 6 |a Study guides 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Computerforensik  |0 (DE-588)4774034-6  |D s 
689 0 2 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 3 |a Malware  |0 (DE-588)4687059-3  |D s 
689 0 |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 978-1-119-53319-1 
856 4 0 |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245  |x Verlag  |z URL des Erstveröffentlichers  |3 John Wiley 
856 4 2 |m SWB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031432020&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Buchcover 
912 |a ZDB-35-WIC 
999 |a oai:aleph.bib-bvb.de:BVB01-031432020 
966 e |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245  |l FHA01  |p ZDB-35-WIC  |q FHA_PDA_WIC_Kauf  |x Verlag  |3 Volltext 
966 e |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245  |l FHN01  |p ZDB-35-WIC  |x Verlag  |3 Volltext 
966 e |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245  |l UBY01  |p ZDB-35-WIC  |q UBY_PDA_WIC_Kauf  |x Verlag  |3 Volltext 

Datensatz im Suchindex

_version_ 1804180317023502336
any_adam_object 1
author Messier, Ric
author_GND (DE-588)1054096732
author_facet Messier, Ric
author_role aut
author_sort Messier, Ric
author_variant r m rm
building Verbundindex
bvnumber BV046050504
collection ZDB-35-WIC
ctrlnum (OCoLC)1111855634
(DE-599)BVBBV046050504
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05021nmm a2200673 c 4500</leader><controlfield tag="001">BV046050504</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200504 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190716s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119533245</subfield><subfield code="c">obook</subfield><subfield code="9">978-1-119-53324-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119533252</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-119-53325-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119533269</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-119-53326-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119533245</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111855634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046050504</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1054096732</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CEH v10</subfield><subfield code="b">certified ethical hacker study guide</subfield><subfield code="c">Ric Messier, CEH, GCIH, GSEC, CISSP</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">CEH v10 certified ethical hacker study guide</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Indiana</subfield><subfield code="b">Sybex, a Wiley brand</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxii, 551 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. -Gain a unique certification that allows you to understand the mind of a hacker -Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions -Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security -Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security) / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hackers / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel / Certification / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures / Examinations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Examinations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel / Certification</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Study guides</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-119-53319-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">John Wiley</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=031432020&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Buchcover</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031432020</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV046050504
illustrated Not Illustrated
indexdate 2024-07-10T08:33:50Z
institution BVB
isbn 9781119533245
9781119533252
9781119533269
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-031432020
oclc_num 1111855634
open_access_boolean
owner DE-92
DE-706
DE-Aug4
owner_facet DE-92
DE-706
DE-Aug4
physical 1 Online-Ressource (xxxii, 551 Seiten) Illustrationen, Diagramme
psigel ZDB-35-WIC
ZDB-35-WIC FHA_PDA_WIC_Kauf
ZDB-35-WIC UBY_PDA_WIC_Kauf
publishDate 2019
publishDateSearch 2019
publishDateSort 2019
publisher Sybex, a Wiley brand
record_format marc
spelling Messier, Ric Verfasser (DE-588)1054096732 aut
CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP
CEH v10 certified ethical hacker study guide
Indianapolis, Indiana Sybex, a Wiley brand [2019]
© 2019
1 Online-Ressource (xxxii, 551 Seiten) Illustrationen, Diagramme
txt rdacontent
c rdamedia
cr rdacarrier
Includes index
As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. -Gain a unique certification that allows you to understand the mind of a hacker -Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions -Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security -Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker
Malware (DE-588)4687059-3 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computerforensik (DE-588)4774034-6 gnd rswk-swf
Kryptologie (DE-588)4033329-2 gnd rswk-swf
Computer security / Examinations / Study guides
Penetration testing (Computer security) / Examinations / Study guides
Hackers / Examinations / Study guides
Computer networks / Security measures / Examinations / Study guides
Electronic data processing personnel / Certification / Study guides
COMPUTERS / Security / General
Computer networks / Security measures / Examinations
Computer security / Examinations
Electronic data processing personnel / Certification
Electronic books
Study guides
Computersicherheit (DE-588)4274324-2 s
Computerforensik (DE-588)4774034-6 s
Kryptologie (DE-588)4033329-2 s
Malware (DE-588)4687059-3 s
DE-604
Erscheint auch als Druck-Ausgabe 978-1-119-53319-1
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245 Verlag URL des Erstveröffentlichers John Wiley
SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031432020&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Buchcover
spellingShingle Messier, Ric
CEH v10 certified ethical hacker study guide
Malware (DE-588)4687059-3 gnd
Computersicherheit (DE-588)4274324-2 gnd
Computerforensik (DE-588)4774034-6 gnd
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4687059-3
(DE-588)4274324-2
(DE-588)4774034-6
(DE-588)4033329-2
title CEH v10 certified ethical hacker study guide
title_alt CEH v10 certified ethical hacker study guide
title_auth CEH v10 certified ethical hacker study guide
title_exact_search CEH v10 certified ethical hacker study guide
title_full CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP
title_fullStr CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP
title_full_unstemmed CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP
title_short CEH v10
title_sort ceh v10 certified ethical hacker study guide
title_sub certified ethical hacker study guide
topic Malware (DE-588)4687059-3 gnd
Computersicherheit (DE-588)4274324-2 gnd
Computerforensik (DE-588)4774034-6 gnd
Kryptologie (DE-588)4033329-2 gnd
topic_facet Malware
Computersicherheit
Computerforensik
Kryptologie
url https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031432020&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT messierric cehv10certifiedethicalhackerstudyguide