did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780071810265

CEH Certified Ethical Hacker Practice Exams

by
  • ISBN13:

    9780071810265

  • ISBN10:

    0071810269

  • Edition: 1st
  • Format: Package
  • Copyright: 2013-02-19
  • Publisher: McGraw-Hill Osborne Media
  • View Upgraded Edition
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $30.00
  • Digital
    $50.00
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Don't let the real test be your first test! Designed as an exam-focused study-self aid and resource, CEH Certified Ethical Hacker Practice Examsoffers practice test items from each domain of the latest CEH exam, and provides knowledge and scenario-based questions plus one case study-based Lab Question per chapter. In-depth answer explanations for both the correct and incorrect answers are included. The book contains more than 400 practice exam questions (in the book and on CD) that match the actual exam questions in content and feel. This is the perfect supplement to CEH Certified Ethical Hacker All-in-One Exam Guide. Covers all exam topics, including intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, virus creation, and more Based on the 2011 CEH exam update Electronic content includes two complete practice exam simulations and an Adobe Digital Editions copy of the book (available for download)

Table of Contents

Chapter 1. Ethical Hacking Basics
Chapter 2. Cryptography 101
Chapter 3. Reconnaissance: Information Gathering for the Ethical Hacker
Chapter 4. Scanning and Enumeration
Chapter 5. Hacking Through the Network: Sniffers and Evasion
Chapter 6. Attacking a System
Chapter 7. Low Tech: Social Engineering and Physical Security
Chapter 8. Web-Based Hacking: Servers and Applications
Chapter 9. Wireless Network Hacking
Chapter 10. Trojans and Other Attacks
Chapter 11. The Pen Test: Putting It All Together

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program