000 -LEADER |
fixed length control field |
04251cam a2200493Ii 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
jomaaum |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230826135114.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS--GENERAL INFORMATION |
fixed length control field |
m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr un|---aucuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210904s2021 cau o 001 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781484272572 |
|
International Standard Book Number |
9781484272589 |
|
International Standard Book Number |
1484272587 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-1-4842-7258-9 |
Source of number or code |
doi |
041 ## - Language |
Language code of text/sound track or separate title |
eng |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
COM053000 |
Source |
bisacsh |
|
Subject category code |
UR |
Source |
bicssc |
|
Subject category code |
UR |
Source |
thema |
|
Subject category code |
UTN |
Source |
thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
Item number |
S543 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Sheikh, Ahmed |
9 (RLIN) |
45538 |
245 10 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
Certified Ethical Hacker (CEH) preparation guide : |
Remainder of title |
lesson-based review of ethical hacking and penetration testing / |
Statement of responsibility, etc |
Ahmed Sheikh |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Berkeley, CA : |
Name of publisher, distributor, etc |
Apress L. P., |
Date of publication, distribution, etc |
2021. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 205 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
500 ## - GENERAL NOTE |
General note |
Includes index |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1. Introduction to Ethical Hacking -- Chapter 2. Footprinting and Reconnaissance/Scanning Networks -- Chapter 3. Enumeration -- Chapter 4. System Hacking -- Chapter 5. Trojans and Backdoor/Viruses and Worms -- Chapter 6. Sniffers and Social Engineering -- Chapter 7. Denial of Service -- Chapter 8. Session Hijacking -- Chapter 9. Hacking Webservers -- Chapter 10. Hacking Web Applications -- Chapter 11. SQL Injection -- Chapter 12. Hacking Wireless Networks -- Chapter 13. Evading Intrusion Detection Systems, Firewalls, and Honeypots -- Chapter 14. Buffer Overflow -- Chapter 15. Cryptography -- Chapter 16. Penetration Testing |
506 ## - RESTRICTIONS ON ACCESS NOTE |
Terms governing access |
Available to OhioLINK libraries |
520 ## - SUMMARY, ETC. |
Summary, etc |
Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam -- a qualification that tests the cybersecurity professional's baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique "lesson" format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. You will: Understand the concepts associated with Footprinting Perform active and passive reconnaissance Identify enumeration countermeasures Be familiar with virus types, virus detection methods, and virus countermeasures Know the proper order of steps used to conduct a session hijacking attack Identify defensive strategies against SQL injection attacks Analyze internal and external network traffic using an intrusion detection system |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer networks |
General subdivision |
Security measures |
-- |
Examinations |
Form subdivision |
Study guides. |
9 (RLIN) |
202 |
|
Topical term or geographic name as entry element |
Computer security |
General subdivision |
Examinations |
Form subdivision |
Study guides. |
9 (RLIN) |
5896 |
|
Topical term or geographic name as entry element |
Electronic data processing personnel |
General subdivision |
Certification. |
|
Topical term or geographic name as entry element |
Hacking |
General subdivision |
Examinations |
Form subdivision |
Study guides. |
9 (RLIN) |
45539 |
|
Topical term or geographic name as entry element |
Penetration testing (Computer security) |
General subdivision |
Examinations |
Form subdivision |
Study guides. |
9 (RLIN) |
45540 |
655 #4 - INDEX TERM--GENRE/FORM |
Genre/form data or focus term |
Electronic books |
|
Genre/form data or focus term |
Study guides. |
Source of term |
lcgft |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
Ohio Library and Information Network. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Print version: |
Main entry heading |
Sheikh, Ahmed |
Title |
Certified Ethical Hacker (CEH) Preparation Guide |
Place, publisher, and date of publication |
Berkeley, CA : Apress L. P.,c2021 |
International Standard Book Number |
9781484272572 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Materials specified |
OhioLINK |
Public note |
Connect to resource |
Uniform Resource Identifier |
https://rave.ohiolink.edu/ebooks/ebc2/9781484272589 |
|
Materials specified |
SpringerLink |
Public note |
Connect to resource (off-campus) |
Uniform Resource Identifier |
http://proxy.ohiolink.edu:9099/login?url=https://link.springer.com/10.1007/978-1-4842-7258-9 |
|
Materials specified |
SpringerLink |
Public note |
Connect to resource |
Uniform Resource Identifier |
https://link.springer.com/10.1007/978-1-4842-7258-9 |
|
Materials specified |
Safari Books Online |
Public note |
Connect to resource |
Uniform Resource Identifier |
https://learning.oreilly.com/library/view/~/9781484272589/?ar |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Book |