LEADER 00999cam2 2200265 450 001 E600200067630 005 20250908085608.0 010 $a0892328169 100 $a20101020d1988 |||||ita|0103 ba 101 $aeng 102 $aGB 200 1 $a<>Mind at large$eKnowing in the technological Age$fPaul Levinson 210 $aLondon$cJAI Press Inc.$d1988 215 $aXVI, 272 p.$d24 cm 461 1$1001SOBE00084298$12001 $aResearch in Philosophy and Technology : official annual publication of the Society for Philosophy Technology$vSupplement 2 700 1$aLevinson$b, Paul$3A600200062771$4070$0775226 801 0$aIT$bUNISOB$c20250908$gRICA 850 $aUNISOB 852 $aUNISOB$j100|Coll|111|K$m53145 912 $aE600200067630 940 $aM 102 Monografia moderna SBN 941 $aM 957 $a100|Coll|111|K$b000023$gSi$d53145$racquisto$tN$1massimo$2UNISOB$3UNISOB$420101020112711.0$520250908085608.0$6bethb 996 $aMind at large$91703063 997 $aUNISOB LEADER 03760nam 2200685Ia 450 001 9910971594803321 005 20251117082433.0 010 $a1-282-68350-0 010 $a9786612683503 010 $a0-470-64286-6 035 $a(CKB)2550000000013627 035 $a(EBL)516952 035 $a(OCoLC)635955021 035 $a(SSID)ssj0000404185 035 $a(PQKBManifestationID)11278728 035 $a(PQKBTitleCode)TC0000404185 035 $a(PQKBWorkID)10341131 035 $a(PQKB)10763189 035 $a(MiAaPQ)EBC516952 035 $a(CaSebORM)9780470525203 035 $a(Au-PeEL)EBL516952 035 $a(CaPaEBR)ebr10383604 035 $a(CaONFJC)MIL268350 035 $a(OCoLC)646133940 035 $a(OCoLC)ocn646133940 035 $a(EXLCZ)992550000000013627 100 $a20100202d2010 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCEH $ecertified ethical hacker study guide /$fKimberly Graves 205 $a1st ed. 210 $aIndianapolis, IN $cWiley$d2010 215 $a1 online resource (439 p.) 300 $aDescription based upon print version of record. 311 08$a0-470-52520-7 320 $aIncludes bibliographical references and index. 327 $aCEH: Certified Ethical Hacker Study Guide; Acknowledgments; About the Author; Contents at a Glance; Contents; Table of Exercises; Introduction; Assessment Test; Answers to Assessment Test; Chapter 1: Introduction to Ethical Hacking, Ethics, and Legality; Chapter 2: Gathering Target Information: Reconnaissance, Footprinting, and Social Engineering; Chapter 3: Gathering Network and Host Information: Scanning and Enumeration; Chapter 4: System Hacking: Password Cracking, Escalating Privileges, and Hiding Files; Chapter 5: Trojans, Backdoors, Viruses, and Worms 327 $aChapter 6: Gathering Data from Networks: SniffersChapter 7: Denial of Service and Session Hijacking; Chapter 8: Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques; Chapter 9: Attacking Applications: SQL Injection and Buffer Overflows; Chapter 10: Wireless Network Hacking; Chapter 11: Physical Site Security; Chapter 12: Hacking Linux Systems; Chapter 13: Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls; Chapter 14: Cryptography; Chapter 15: Performing a Penetration Test; Appendix: About the Companion CD; Glossary 327 $aIndex 330 $aFull Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial 606 $aElectronic data processing personnel$xCertification 606 $aComputer security$xExaminations$vStudy guides 606 $aHackers$xExaminations$vStudy guides 606 $aComputer networks$xExaminations$vStudy guides 615 0$aElectronic data processing personnel$xCertification. 615 0$aComputer security$xExaminations 615 0$aHackers$xExaminations 615 0$aComputer networks$xExaminations 676 $a005.8 700 $aGraves$b Kimberly$f1974-$01856678 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910971594803321 996 $aCEH$94456362 997 $aUNINA