| 000 | 03167nam a2200481Ia 4500 | ||
|---|---|---|---|
| 999 |
_c11983 _d11983 |
||
| 001 | 1107052693 | ||
| 005 | 20210418121620.0 | ||
| 006 | m o d | ||
| 007 | cr unu|||||||| | ||
| 008 | 190702s2019 nyu 000 0 eng d | ||
| 020 | _a1260455092 | ||
| 020 | _a9781260455090 | ||
| 020 | _z9781260455083 | ||
| 035 | _a(OCoLC)1107052693 | ||
| 035 | _a(Safari)9781260455090 | ||
| 037 |
_aCL0501000057 _bSafari Books Online |
||
| 040 |
_aUMI _beng _erda _epn _cUMI _dEG-NcFUE |
||
| 050 | 4 | _aQA76.9.A25 | |
| 082 | 0 | 4 |
_223 _a005.8 _bW.M.C |
| 100 | 1 |
_aWalker, Matthew, _eauthor |
|
| 245 | 1 | 0 |
_aCEH, certified ethical hacker practice exams / _cMatt Walker |
| 246 | 3 | 0 | _aCertified ethical hacker practice exams |
| 250 | _aFourth edition | ||
| 264 | 1 |
_aNew York : _bMcGraw-Hill Education, _c[2019] |
|
| 264 | 4 | _c©2019 | |
| 300 | _a1 online resource (1 volume) | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aPrevious edition published: 2017 | ||
| 505 | 0 | _aCover About the Author Title Page Copyright Page Dedication Contents Acknowledgments Introduction Chapter 1 Getting Started: Essential Knowledge Questions Quick Answer Key Answers Chapter 2 Reconnaissance: Information Gathering for the Ethical Hacker Questions Quick Answer Key Answers Chapter 3 Scanning and Enumeration Questions Quick Answer Key Answers Chapter 4 Sniffing and Evasion Questions Quick Answer Key Answers Chapter 5 Attacking a System Questions Quick Answer Key Answers Chapter 6 Web-Based Hacking: Servers and Applications Questions Quick Answer Key Answers Chapter 7 Wireless Network Hacking Questions Quick Answer Key Answers Chapter 8 Mobile Communications and the IoT Questions Quick Answer Key Answers Chapter 9 Security in Cloud Computing Questions Quick Answer Key Answers Chapter 10 Trojans and Other Attacks Questions Quick Answer Key Answers Chapter 11 Cryptography 101 Questions Quick Answer Key Answers Chapter 12 Low Tech: Social Engineering and Physical Security Questions Quick Answer Key Answers Chapter 13 The Pen Test: Putting It All Together Questions Quick Answer Key Answers Appendix A Pre-assessment Test Questions Quick Answer Key Answers Analyzing Your Results Appendix B About the Online Content System Requirements Your Total Seminars Training Hub Account Single User License Terms and Conditions TotalTester Online Technical Support | |
| 506 | _aAvailable to OhioLINK libraries | ||
| 650 | 0 |
_aComputer networks _xExaminations _vExaminations, questions, etc |
|
| 650 | 0 |
_aComputer security _vExaminations, questions, etc |
|
| 650 | 0 |
_aElectronic data processing personnel _xCertification |
|
| 650 | 0 |
_aHacking _xExaminations _vExaminations, questions, etc |
|
| 650 | 0 |
_aPenetration testing (Computer security) _vExaminations, questions, etc |
|
| 655 | 4 | _aElectronic books | |
| 710 | 2 | _aOhio Library and Information Network | |
| 856 | 4 | 0 |
_3Safari Books Online _zConnect to resource _uhttps://learning.oreilly.com/library/view/-/9781260455090/?ar |
| 942 |
_2ddc _cBK |
||