| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910555063503321 |
|
|
Autore |
Messier Ric |
|
|
Titolo |
CEH v10 certified ethical hacker study guide / / Ric Messier |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Indianapolis, Indiana : , : Sybex, , [2019] |
|
©2019 |
|
|
|
|
|
|
|
|
|
ISBN |
|
1-119-53326-0 |
1-119-53325-2 |
1-119-53324-4 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (587 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security - Examinations |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Sommario/riassunto |
|
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully |
|
|
|
|
|
|
|
|
|
|
|
|
|
updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910137147003321 |
|
|
Autore |
Bergauer Christian |
|
|
Titolo |
Das materielle Computerstrafrecht / / Christian Bergauer |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Jan Sramek Verlag, 2016 |
|
Wien : , : Jan Sramek Verlag, , [2016] |
|
©2016 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xxviii, 669 pages) : digital, PDF file(s) |
|
|
|
|
|
|
Collana |
|
Open Access e-Books |
Knowledge Unlatched |
IT und Strafrecht |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer crimes - Law and legislation - Austria |
Denial of service attacks - Law and legislation - Austria |
Phishing - Law and legislation - Austria |
Cyberstalking - Law and legislation - Austria |
Hacking - Law and legislation - Austria |
Cyberterrorism - Law and legislation - Austria |
Malware (Computer software) - Law and legislation - Austria |
Internet pornography - Law and legislation - Austria |
Internet fraud - Law and legislation - Austria |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references (pages 631-669) |
|
|
|
|
|
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The aims of the present study are to describe the modern forms of cybercrime and analyze the substantive computer-specific offenses of the Austrian Penal Code by the means of specialist literature and - as available - relevant judgments. Based on the debate about the terms “cybercrime” or “computer criminal law” and the term of data in the Austrian Penal Code, the specific substantive computer-specific offenses, including the penal provision of the Data Protection Code concerning the criminal protection of personal data, are presented and discussed systematically. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910557476003321 |
|
|
Autore |
Ryoo Cheon-Seoung |
|
|
Titolo |
Polynomials : Theory and Applications |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Basel, Switzerland, : MDPI - Multidisciplinary Digital Publishing Institute, 2020 |
|
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (152 p.) |
|
|
|
|
|
|
Soggetti |
|
Mathematics and Science |
Research and information: general |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Sommario/riassunto |
|
Polynomial and its applications are well known for their proven properties and excellent applicability in interdisciplinary fields of science. Until now, research on polynomial and its applications has been done in mathematics, applied mathematics, and sciences. This book is based on recent results in all areas related to polynomial and its applications. This book provides an overview of the current research in the field of polynomials and its applications. The following papers have been published in this volume: 'A Parametric Kind of the Degenerate Fubini Numbers and Polynomials'; 'On 2-Variables Konhauser Matrix Polynomials and Their Fractional Integrals'; 'Fractional Supersymmetric Hermite Polynomials'; 'Rational |
|
|
|
|
|
|
|
|
|
|
Approximation for Solving an Implicitly Given Colebrook Flow Friction Equation'; 'Iterating the Sum of Möbius Divisor Function and Euler Totient Function'; 'Differential Equations Arising from the Generating Function of the (r, β)-Bell Polynomials and Distribution of Zeros of Equations'; 'Truncated Fubini Polynomials'; 'On Positive Quadratic Hyponormality of a Unilateral Weighted Shift with Recursively Generated by Five Weights'; 'Ground State Solutions for Fractional Choquard Equations with Potential Vanishing at Infinity'; 'Some Identities on Degenerate Bernstein and Degenerate Euler Polynomials'; 'Some Identities Involving Hermite Kampé de Fériet Polynomials Arising from Differential Equations and Location of Their Zeros.' |
|
|
|
|
|
| |