//]]>

Certified Ethical Hacker (CEH) preparation guide : (Record no. 35605)

000 -LEADER
fixed length control field 04251cam a2200493Ii 4500
003 - CONTROL NUMBER IDENTIFIER
control field jomaaum
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230826135114.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr un|---aucuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210904s2021 cau o 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781484272572
International Standard Book Number 9781484272589
International Standard Book Number 1484272587
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-1-4842-7258-9
Source of number or code doi
041 ## - Language
Language code of text/sound track or separate title eng
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
Subject category code UR
Source bicssc
Subject category code UR
Source thema
Subject category code UTN
Source thema
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
Item number S543
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Sheikh, Ahmed
9 (RLIN) 45538
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title Certified Ethical Hacker (CEH) preparation guide :
Remainder of title lesson-based review of ethical hacking and penetration testing /
Statement of responsibility, etc Ahmed Sheikh
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Berkeley, CA :
Name of publisher, distributor, etc Apress L. P.,
Date of publication, distribution, etc 2021.
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 205 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note Includes index
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1. Introduction to Ethical Hacking -- Chapter 2. Footprinting and Reconnaissance/Scanning Networks -- Chapter 3. Enumeration -- Chapter 4. System Hacking -- Chapter 5. Trojans and Backdoor/Viruses and Worms -- Chapter 6. Sniffers and Social Engineering -- Chapter 7. Denial of Service -- Chapter 8. Session Hijacking -- Chapter 9. Hacking Webservers -- Chapter 10. Hacking Web Applications -- Chapter 11. SQL Injection -- Chapter 12. Hacking Wireless Networks -- Chapter 13. Evading Intrusion Detection Systems, Firewalls, and Honeypots -- Chapter 14. Buffer Overflow -- Chapter 15. Cryptography -- Chapter 16. Penetration Testing
506 ## - RESTRICTIONS ON ACCESS NOTE
Terms governing access Available to OhioLINK libraries
520 ## - SUMMARY, ETC.
Summary, etc Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam -- a qualification that tests the cybersecurity professional's baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique "lesson" format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. You will: Understand the concepts associated with Footprinting Perform active and passive reconnaissance Identify enumeration countermeasures Be familiar with virus types, virus detection methods, and virus countermeasures Know the proper order of steps used to conduct a session hijacking attack Identify defensive strategies against SQL injection attacks Analyze internal and external network traffic using an intrusion detection system
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures
-- Examinations
Form subdivision Study guides.
9 (RLIN) 202
Topical term or geographic name as entry element Computer security
General subdivision Examinations
Form subdivision Study guides.
9 (RLIN) 5896
Topical term or geographic name as entry element Electronic data processing personnel
General subdivision Certification.
Topical term or geographic name as entry element Hacking
General subdivision Examinations
Form subdivision Study guides.
9 (RLIN) 45539
Topical term or geographic name as entry element Penetration testing (Computer security)
General subdivision Examinations
Form subdivision Study guides.
9 (RLIN) 45540
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books
Genre/form data or focus term Study guides.
Source of term lcgft
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Ohio Library and Information Network.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Print version:
Main entry heading Sheikh, Ahmed
Title Certified Ethical Hacker (CEH) Preparation Guide
Place, publisher, and date of publication Berkeley, CA : Apress L. P.,c2021
International Standard Book Number 9781484272572
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified OhioLINK
Public note Connect to resource
Uniform Resource Identifier https://rave.ohiolink.edu/ebooks/ebc2/9781484272589
Materials specified SpringerLink
Public note Connect to resource (off-campus)
Uniform Resource Identifier http://proxy.ohiolink.edu:9099/login?url=https://link.springer.com/10.1007/978-1-4842-7258-9
Materials specified SpringerLink
Public note Connect to resource
Uniform Resource Identifier https://link.springer.com/10.1007/978-1-4842-7258-9
Materials specified Safari Books Online
Public note Connect to resource
Uniform Resource Identifier https://learning.oreilly.com/library/view/~/9781484272589/?ar
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Lost status Withdrawn status Source of acquisition Cost, replacement price Damaged status Barcode Shelving location Current location Public note Full call number
2023-08-26AUM Main Library2023-08-26 2023-08-26 Book  UBCC28.70 AUM-025989English Collections HallAUM Main Libraryinv 2023/0506005.8 S543

Languages: 
English |
العربية