CEH v10 certified ethical hacker study guide
As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 C...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Indianapolis, Indiana
Sybex, a Wiley brand
[2019]
|
Schlagworte: | |
Online-Zugang: | FHA01 FHN01 UBY01 URL des Erstveröffentlichers Buchcover |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV046050504 | ||
003 | DE-604 | ||
005 | 20200504 | ||
007 | cr|uuu---uuuuu | ||
008 | 190716s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781119533245 |c obook |9 978-1-119-53324-5 | ||
020 | |a 9781119533252 |c ebk |9 978-1-119-53325-2 | ||
020 | |a 9781119533269 |c ebook |9 978-1-119-53326-9 | ||
024 | 7 | |a 10.1002/9781119533245 |2 doi | |
035 | |a (OCoLC)1111855634 | ||
035 | |a (DE-599)BVBBV046050504 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-92 |a DE-706 |a DE-Aug4 | ||
100 | 1 | |a Messier, Ric |e Verfasser |0 (DE-588)1054096732 |4 aut | |
245 | 1 | 0 | |a CEH v10 |b certified ethical hacker study guide |c Ric Messier, CEH, GCIH, GSEC, CISSP |
246 | 1 | 3 | |a CEH v10 certified ethical hacker study guide |
264 | 1 | |a Indianapolis, Indiana |b Sybex, a Wiley brand |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a 1 Online-Ressource (xxxii, 551 Seiten) |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | 3 | |a As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. -Gain a unique certification that allows you to understand the mind of a hacker -Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions -Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security -Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker | |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerforensik |0 (DE-588)4774034-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer security / Examinations / Study guides | |
653 | 0 | |a Penetration testing (Computer security) / Examinations / Study guides | |
653 | 0 | |a Hackers / Examinations / Study guides | |
653 | 0 | |a Computer networks / Security measures / Examinations / Study guides | |
653 | 0 | |a Electronic data processing personnel / Certification / Study guides | |
653 | 0 | |a COMPUTERS / Security / General | |
653 | 0 | |a Computer networks / Security measures / Examinations | |
653 | 0 | |a Computer security / Examinations | |
653 | 0 | |a Electronic data processing personnel / Certification | |
653 | 6 | |a Electronic books | |
653 | 6 | |a Study guides | |
653 | 6 | |a Study guides | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Computerforensik |0 (DE-588)4774034-6 |D s |
689 | 0 | 2 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 3 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-119-53319-1 |
856 | 4 | 0 | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245 |x Verlag |z URL des Erstveröffentlichers |3 John Wiley |
856 | 4 | 2 | |m SWB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031432020&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Buchcover |
912 | |a ZDB-35-WIC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031432020 | ||
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245 |l FHA01 |p ZDB-35-WIC |q FHA_PDA_WIC_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245 |l FHN01 |p ZDB-35-WIC |x Verlag |3 Volltext | |
966 | e | |u https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245 |l UBY01 |p ZDB-35-WIC |q UBY_PDA_WIC_Kauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180317023502336 |
---|---|
any_adam_object | 1 |
author | Messier, Ric |
author_GND | (DE-588)1054096732 |
author_facet | Messier, Ric |
author_role | aut |
author_sort | Messier, Ric |
author_variant | r m rm |
building | Verbundindex |
bvnumber | BV046050504 |
collection | ZDB-35-WIC |
ctrlnum | (OCoLC)1111855634 (DE-599)BVBBV046050504 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05021nmm a2200673 c 4500</leader><controlfield tag="001">BV046050504</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200504 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190716s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119533245</subfield><subfield code="c">obook</subfield><subfield code="9">978-1-119-53324-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119533252</subfield><subfield code="c">ebk</subfield><subfield code="9">978-1-119-53325-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119533269</subfield><subfield code="c">ebook</subfield><subfield code="9">978-1-119-53326-9</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1002/9781119533245</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1111855634</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046050504</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-92</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1054096732</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">CEH v10</subfield><subfield code="b">certified ethical hacker study guide</subfield><subfield code="c">Ric Messier, CEH, GCIH, GSEC, CISSP</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">CEH v10 certified ethical hacker study guide</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, Indiana</subfield><subfield code="b">Sybex, a Wiley brand</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxxii, 551 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. -Gain a unique certification that allows you to understand the mind of a hacker -Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions -Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security -Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security) / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hackers / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures / Examinations / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel / Certification / Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Security / General</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures / Examinations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / Examinations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electronic data processing personnel / Certification</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Electronic books</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Study guides</subfield></datafield><datafield tag="653" ind1=" " ind2="6"><subfield code="a">Study guides</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computerforensik</subfield><subfield code="0">(DE-588)4774034-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-119-53319-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">John Wiley</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">SWB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031432020&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Buchcover</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-35-WIC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031432020</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">FHA_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-35-WIC</subfield><subfield code="q">UBY_PDA_WIC_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046050504 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:33:50Z |
institution | BVB |
isbn | 9781119533245 9781119533252 9781119533269 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031432020 |
oclc_num | 1111855634 |
open_access_boolean | |
owner | DE-92 DE-706 DE-Aug4 |
owner_facet | DE-92 DE-706 DE-Aug4 |
physical | 1 Online-Ressource (xxxii, 551 Seiten) Illustrationen, Diagramme |
psigel | ZDB-35-WIC ZDB-35-WIC FHA_PDA_WIC_Kauf ZDB-35-WIC UBY_PDA_WIC_Kauf |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Sybex, a Wiley brand |
record_format | marc |
spelling | Messier, Ric Verfasser (DE-588)1054096732 aut CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP CEH v10 certified ethical hacker study guide Indianapolis, Indiana Sybex, a Wiley brand [2019] © 2019 1 Online-Ressource (xxxii, 551 Seiten) Illustrationen, Diagramme txt rdacontent c rdamedia cr rdacarrier Includes index As protecting information becomes a rapidly growing concern for today's businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you've learned into the context of actual job roles. -Gain a unique certification that allows you to understand the mind of a hacker -Expand your career opportunities with an IT certificate that satisfies the Department of Defense's 8570 Directive for Information Assurance positions -Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security -Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker Malware (DE-588)4687059-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computerforensik (DE-588)4774034-6 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Computer security / Examinations / Study guides Penetration testing (Computer security) / Examinations / Study guides Hackers / Examinations / Study guides Computer networks / Security measures / Examinations / Study guides Electronic data processing personnel / Certification / Study guides COMPUTERS / Security / General Computer networks / Security measures / Examinations Computer security / Examinations Electronic data processing personnel / Certification Electronic books Study guides Computersicherheit (DE-588)4274324-2 s Computerforensik (DE-588)4774034-6 s Kryptologie (DE-588)4033329-2 s Malware (DE-588)4687059-3 s DE-604 Erscheint auch als Druck-Ausgabe 978-1-119-53319-1 https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245 Verlag URL des Erstveröffentlichers John Wiley SWB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031432020&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Buchcover |
spellingShingle | Messier, Ric CEH v10 certified ethical hacker study guide Malware (DE-588)4687059-3 gnd Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4687059-3 (DE-588)4274324-2 (DE-588)4774034-6 (DE-588)4033329-2 |
title | CEH v10 certified ethical hacker study guide |
title_alt | CEH v10 certified ethical hacker study guide |
title_auth | CEH v10 certified ethical hacker study guide |
title_exact_search | CEH v10 certified ethical hacker study guide |
title_full | CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP |
title_fullStr | CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP |
title_full_unstemmed | CEH v10 certified ethical hacker study guide Ric Messier, CEH, GCIH, GSEC, CISSP |
title_short | CEH v10 |
title_sort | ceh v10 certified ethical hacker study guide |
title_sub | certified ethical hacker study guide |
topic | Malware (DE-588)4687059-3 gnd Computersicherheit (DE-588)4274324-2 gnd Computerforensik (DE-588)4774034-6 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Malware Computersicherheit Computerforensik Kryptologie |
url | https://onlinelibrary.wiley.com/doi/book/10.1002/9781119533245 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=031432020&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT messierric cehv10certifiedethicalhackerstudyguide |