header engleza21 ian desk

MAI SUNT 00:00:00:00

MAI SUNT

X

headerengleza21 ian mob

MAI SUNT 00:00:00:00

MAI SUNT

X

Promotii popup img

BOOKish weekend

Carti in limba engleza

-15%-30%

Comanda aici:
Close

Certified Ethical Hacker Version 9 Cert Guide

Certified Ethical Hacker  Version 9 Cert Guide - Michael Gregg

Certified Ethical Hacker Version 9 Cert Guide

In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael's concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.
- Every feature of this book supports both efficient exam preparation and long-term mastery: - Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives - Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success - Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career - Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology
This study guide helps you master all the topics on the latest CEH exam, including - Ethical hacking basics - Technical foundations of hacking - Footprinting and scanning - Enumeration and system hacking - Linux distro's, such as Kali and automated assessment tools - Trojans and backdoors - Sniffers, session hijacking, and denial of service - Web server hacking, web applications, and database attacks - Wireless technologies, mobile security, and mobile attacks - IDS, firewalls, and honeypots - Buffer overflows, viruses, and worms - Cryptographic attacks and defenses - Cloud security and social engineering
Citeste mai mult

transport gratuit

-15%

278.09Lei

327.17 Lei

Sau 27809 de puncte

!

Fiecare comanda noua reprezinta o investitie pentru viitoarele tale comenzi. Orice comanda plasata de pe un cont de utilizator primeste in schimb un numar de puncte de fidelitate, In conformitate cu regulile de conversiune stabilite. Punctele acumulate sunt incarcate automat in contul tau si pot fi folosite ulterior, pentru plata urmatoarelor comenzi.

Livrare in 3-5 saptamani

Descrierea produsului

In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael's concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know.
- Every feature of this book supports both efficient exam preparation and long-term mastery: - Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives - Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success - Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career - Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology
This study guide helps you master all the topics on the latest CEH exam, including - Ethical hacking basics - Technical foundations of hacking - Footprinting and scanning - Enumeration and system hacking - Linux distro's, such as Kali and automated assessment tools - Trojans and backdoors - Sniffers, session hijacking, and denial of service - Web server hacking, web applications, and database attacks - Wireless technologies, mobile security, and mobile attacks - IDS, firewalls, and honeypots - Buffer overflows, viruses, and worms - Cryptographic attacks and defenses - Cloud security and social engineering
Citeste mai mult

Detaliile produsului

De pe acelasi raft

Parerea ta e inspiratie pentru comunitatea Libris!

Noi suntem despre carti, si la fel este si

Newsletter-ul nostru.

Aboneaza-te la vestile literare si primesti un cupon de -10% pentru viitoarea ta comanda!

*Reducerea aplicata prin cupon nu se cumuleaza, ci se aplica reducerea cea mai mare.

Ma abonez image one
Ma abonez image one