Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The CEH Prep Guide: The Comprehensive Guide to Certified Ethical Hacking

Buy
A benchmark guide for keeping networks safe with the Certified Ethical Hacker program

Seasoned authors Ronald Krutz and Russell Dean Vines continue in the tradition of their CISSP security franchise by bringing you this comprehensive guide to the Certified Ethical Hacker (CEH) program. Serving as a valuable tool for acquiring the necessary knowledge to prepare for and pass the CEH exam, this book offers clear, concise, and easy-to-understand explanations of key ethical hacking topics as well as hundreds of review questions. Krutz and Vines equip you with in-depth coverage of the latest hacking techniques you'll need to know in order to pass the qualifying examinations, and they arm you with both offensive and defensive approaches to help organizations identify vulnerabilities and protect their information systems.

In addition to its technical content, The CEH Prep Guide examines the legal and ethical requirements and ramifications that are associated with ethical hacking, the rationale behind it, relevant technologies and terminology, and the increased professional responsibility that accompanies the CEH certification. You'll get essential information on penetration testing, vulnerability analysis, risk mitigation, countermeasures, and upgrading defenses in an effective and cost-efficient manner. Plus, the knowledge gained from this guide is applicable to commercial, industrial, military, and government organizations. Greatly increasing your chances of success when taking the CEH exam, The CEH Prep Guide also covers:

  • Footprinting, scanning, and enumeration
  • Trojans, backdoors, and sniffers

  • Denial of service and social engineering

  • Linux hacking, cryptography, and buffer overflows

  • Honeypots, firewalls, viruses, and worms

  • Web application vulnerabilities and Web-based password cracking techniques

The accompanying CD-ROM features hundreds of questions and answers, and also serves as a self-paced examination review and knowledge reinforcement tool.

About the Author

RONALD L. KRUTZ, Ph.D., P.E., CISSP, ISSEP, is the Chief Knowledge Officer of Cybrinth, LLC. Dr. Krutz is the author of numerous bestselling publications in the area of information systems security, and is a consulting editor for John Wiley and Sons for its information security book series.

RUSSELL DEAN VINES, CISSP, CISM, Security +, CCNA, MCSE, MCNE, is Chief Security Advisor for Gotham Technology Group, LLC. He is the author or coauthor of numerous bestselling information system security publications, and is a consulting editor for John Wiley and Sons for its information security book series.

(HTML tags aren't allowed.)

Investment Manager Analysis: A Comprehensive Guide to Portfolio Selection, Monitoring and Optimization
Investment Manager Analysis: A Comprehensive Guide to Portfolio Selection, Monitoring and Optimization
Investment Manager Analysis provides readers with a broad framework that covers the investment manager due diligence process from initial screening to analytical techniques, interviewing skills, and legal and contract negotiations. As it guides the reader through the selection process, it clearly demonstrates a variety of mechanisms for...
Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)
Risk and Portfolio Analysis: Principles and Methods (Springer Series in Operations Research and Financial Engineering)

Investment and risk management problems are fundamental problems for  financial institutions and involve both speculative and hedging decisions. A structured approach to these problems naturally leads one to the field of applied mathematics in order to translate subjective probability beliefs and attitudes towards risk and reward into...

The Path of Daggers (The Wheel of Time, Book 8)
The Path of Daggers (The Wheel of Time, Book 8)

The #1 internationally bestselling saga that began with The Eye of the World has reached new popularity with each volume. Now the phenomenal tale continues.With the Seanchan invasion force in possession of Ebou Dar, Nynaeve, Elayne and Aviendha head for Caemlyn and Elayne's rightful throne, but discover a worse enemy than the Seanchan. In...


Office 365: Migrating and Managing Your Business in the Cloud
Office 365: Migrating and Managing Your Business in the Cloud

Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical...

Digital SLR Cameras and Photography For Dummies (Computer/Tech)
Digital SLR Cameras and Photography For Dummies (Computer/Tech)

The ideal guide for beginning DSLR camera users, with full-color examples of what you can achieve

Make the most of your Canon, Nikon, Sony, Pentax, or Olympus digital SLR camera! This guide explains the different lenses, the many settings and how to use them, the results you can get from using different controls, how to use lighting and...

Card Sorting
Card Sorting
There’s something about cards. Cards can turn the drab and mundane into something strangely exciting. Recipe cards, for example, have a peculiar allure that cookbooks lack. A book full of tables of baseball statistics? Dull as dishwater. Put those same stats on the backs of trading cards, however, and now...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy