| 000 | 01888 a2200313 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20241019110708.0 | ||
| 010 | _a 2006101131 | ||
| 020 | _a0782144373 (pbk./cd-rom) | ||
| 020 | _a9780782144376 (pbk./cd-rom) | ||
| 035 | _a(OCoLC)76961319 | ||
| 035 | _a(OCoLC)ocm76961319 | ||
| 040 | _cNust | ||
| 082 | 0 | 0 | _a005.8,GRA |
| 100 | 1 |
_aGraves, Kimberly, _9126387 |
|
| 245 | 1 | 0 |
_aCEH : _bofficial certified ethical hacker review guide / _cKimberly Graves |
| 246 | 3 | _aCertified ethical hacker | |
| 260 |
_aIndianapolis, Ind. : _bWiley Pub., _cc2007. |
||
| 300 |
_axxii, 238 p. : _bill. ; _c23 cm. + _e1 CD-ROM (4 3/4 in.) |
||
| 505 | 0 | _aIntroduction to ethical hacking, ethics, and legality (Page-1), Footprinting and social engineering (Page-19), Scanning and enumeration (Page-41), System hacking (Page-67), Trojans, backdoors, viruses, and worms (Page-91), Sniffers (Page-107), Denial of service and session hijacking (Page-119), Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques (Page-137), SQL injection and buffer overflows (Page-151), Wireless hacking (Page-159), Physical security (Page-169), Linux hacking (Page-177), Evading IDSs, honeypots, and firewalls (Page-187), Cryptography (Page-195), Penetration testing methodologies (Page-203). | |
| 650 | 0 |
_aComputer hackers _xExaminations _9126388 |
|
| 650 | 0 |
_aComputer networks _xExaminations _994252 |
|
| 650 | 0 |
_aComputer security _xExaminations _995207 |
|
| 650 | 0 |
_aElectronic data processing personnel _xCertification. _981704 |
|
| 856 | 4 | 2 |
_3Contributor biographical information _uhttp://www.loc.gov/catdir/enhancements/fy0741/2006101131-b.html |
| 856 | 4 | 2 |
_3Publisher description _uhttp://www.loc.gov/catdir/enhancements/fy0653/2006101131-d.html |
| 856 | 4 | 2 |
_3Table of contents only _uhttp://www.loc.gov/catdir/toc/ecip0718/2006101131.html |
| 942 |
_2ddc _cBK |
||
| 999 |
_c188937 _d188937 |
||