MARC details
000 -LEADER |
fixed length control field |
02603cam a22003255i 4500 |
001 - CONTROL NUMBER |
control field |
22253903 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
NU |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20250517114738.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
210927s2022 nju 000 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
LC control number |
2021947879 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
Canceled/invalid ISBN |
978-0-13-748998-5 |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
NU FAIRVIEW |
Transcribing agency |
NU FAIRVIEW |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA 76.9 G74 2022 |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Gregg, Michael |
Relator term |
author. |
245 10 - TITLE STATEMENT |
Title |
CEH certified ethical hacker cert guide / |
Statement of responsibility, etc. |
Michael Gregg and Omar Santos. |
250 ## - EDITION STATEMENT |
Edition statement |
4th edition |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Hoboken : |
Name of publisher, distributor, etc. |
Pearson Education, Inc, |
Date of publication, distribution, etc. |
c2022. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxxviii, 709 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price amount |
3456.00 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes index |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction. -- Chapter 1 : An Introduction to Ethical Hacking. -- Chapter 2 : The Technical Foundations of Hacking. -- Chapter 3 : Footprinting, Reconnaissance, and Scanning. -- Chapter 4 : Enumeration and System Hacking. -- Chapter 5 : Social Engineering, Malware Threats, and Vulnerability Analysis. -- Chapter 6 : Sniffers, Session Hijacking, and Denial of Service. -- Chapter 7 : Web Server Hacking, Web Applications, and Database Attacks. -- Chapter 8 : Wireless Technologies, Mobile Security, and Attacks. -- Chapter 9 : Evading IDS, Firewalls, and Honeypots. -- Chapter 10 : Cryptographic Attacks and Defenses. -- Chapter 11 : Cloud Computing, IoT, and Botnets. -- Chapter 12 : Final Preparation. -- |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"This study guide helps you master topics on EC-Council's Certified Ethical Hacker (CEH) exam: Understand technical foundations of hacking and the basics of ethical hacking. Select targets and perform footprinting and enumeration. Uncover detailed information about a target, and begin exploiting vulnerabilities. Explore social engineering, malware threats, and vulnerability tracking and mitigation Review passive and active packet capture techniques Discuss session hijacking, DoS/DDoS, and botnets. Explore web hacking, application attacks, and SQL injection. Review wireless and mobile technologies and vulnerabilities. See how threat actors bypass intrusion detection systems and firewalls. Discover tactics, techniques, and procedures (TTPs) for attacking cryptographic systems Understand cloud models, cloud security, and cloud penetration testing"-- |
Assigning source |
Provided by publisher. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
COMPUTER SECURITY. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
ELECTRONIC DATA PROCESSING PERSONNEL CERTIFICATION. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
ELECTRONIC DATA PROCESSING PERSONNEL CERTIFICATION STUDY GUIDES. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
PENETRATION TESTING (COMPUTER SECURITY). |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Omar, Santos |
Relator term |
author. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Books |
Suppress in OPAC |
No |