CEH v9 : Certified ethical hacker version 9, study guide

The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using...

Full description

Saved in:
Bibliographic Details
Main Author: Oriyano, Sean-Philip, (Author)
Format: eBook
Language: English
Published: Indianapolis, IN : Sybex, 2016.
Subjects:
ISBN: 9781119419303
9781119252276
9781119252252
9781119252245
Physical Description: 1 online resource

Cover

Table of contents

LEADER 04742cam a2200661 i 4500
001 97031
003 CZ-ZlUTB
005 20240914110318.0
006 m o d
007 cr cnu|||unuuu
008 160426s2016 inu eop 000 0 eng d
999 |c 97031  |d 97031 
020 |a 9781119419303  |q (electronic bk. ;  |q oBook) 
020 |a 9781119252276  |q (electronic bk.) 
020 |a 9781119252252 
020 |z 9781119252245 
035 |a (OCoLC)947837674  |z (OCoLC)949259299  |z (OCoLC)953862186 
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d IDEBK  |d N$T  |d TEFOD  |d OCLCQ  |d YDXCP  |d OCLCO  |d CDX  |d RECBK  |d NLE  |d DG1  |d YDX  |d OTZ  |d OCLCQ  |d UPM  |d OCLCA  |d OCLCQ  |d DG1  |d OCLCF  |d OCLCQ  |d UKMGB  |d WYU  |d U3W  |d OCLCQ  |d AU@  |d UKAHL  |d OCLCQ  |d OCL 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
072 7 |a 37.016  |x Učební osnovy. Vyučovací předměty. Učebnice  |2 Konspekt  |9 22 
080 |a 004.056  |2 MRF 
080 |a 004.056.53  |2 MRF 
080 |a 004.7  |2 MRF 
080 |a 004.62  |2 MRF 
080 |a 004.056.53-051  |2 MRF 
080 |a (0.034.2:08  |2 MRF 
080 |a (075)  |2 MRF 
100 1 |a Oriyano, Sean-Philip,  |e author. 
245 1 0 |a CEH v9 :  |b Certified ethical hacker version 9, study guide /  |c Sean-Philip Oriyano. 
264 1 |a Indianapolis, IN :  |b Sybex,  |c 2016. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material.-Review all CEH v9 topics systematically -Reinforce critical skills with hands-on exercises -Learn how concepts apply in real-world scenarios -Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam-making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors.- Resumév vydavatel 
590 |a John Wiley and Sons  |b Wiley Online Library All Obooks 
650 0 7 |a počítačová bezpečnost  |2 czenas  |7 ph165952 
650 0 7 |a penetrační testy (počítačová bezpečnost)  |2 czenas  |7 ph888574 
650 0 7 |a počítačové sítě  |2 czenas  |7 ph115867 
650 0 7 |a zpracování dat  |2 czenas  |7 ph127675 
650 0 7 |a certifikace  |2 czenas  |7 ph119105 
650 0 7 |a hackeři  |2 czenas  |7 ph1066932 
650 0 9 |a computer security  |2 eczenas 
650 0 9 |a penetration tests (computer security)  |2 eczenas 
650 0 9 |a computer networks  |2 eczenas 
650 0 9 |a data processing  |2 eczenas 
650 0 9 |a certification  |2 eczenas 
650 0 9 |a hackers  |2 eczenas 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 7 |a učebnice  |7 fd133770   |2 czenas 
655 9 |a electronic books  |2 eczenas 
655 9 |a textbooks and mauals  |2 eczenas 
776 0 8 |i Print version:  |a Oriyano, Sean-Philip.  |t CEHv9.  |d Indianapolis, IN : Wiley, [2016]  |z 9781119252245  |w (DLC) 2016934529  |w (OCoLC)929586190 
856 4 0 |u https://proxy.k.utb.cz/login?url=https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419303  |y Plný text 
942 |2 udc 
992 |c NTK-Wiley 
993 |x NEPOSILAT  |y EIZ