Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overvi[...]
The book will cover the how to break into and how to defend the most popular database server software. These include: Oracle Microsoftâs SQL Server IBMâs DB2 Postgres Sybase MySQL Each of these will be examined to show how hackers gain access using various methods from buffer ov[...]
The CEH certification shows knowledge of network penetration testing skills. The CEH exam takes three hours and 125 questions, requiring a broad and deep knowledge of network security issues. The CEH Exam Prep is the perfect solution for this challenge, giving you the solid, in-depth coverage you'll[...]
Learn, prepare, and practice for CEH v8 exam success with Certified Ethical Hacker (CEH) Cert Guide from Pearson IT Certification, a leader in IT certification. * Master CEH exam topics * Assess your knowledge with chapter-ending quizzes * Review key concepts with exam preparation tasks * Practice[...]
MyITcertificationlab: This product should be used in an instructor led classroom environment and is not intended for individual self-study[...]
In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael's concise, focused approach explains every exam objective from a real-world pers[...]
This volume presents the most current perspectives on the role of metacognition in diverse educationally relevant domains. The purpose is to examine the ways in which theoretical investigations of metacognition have recently produced a strong focus on educational practice. The book is organized arou[...]
Ecology is a vibrant and readable textbook featuring real-world cases and memorable key concepts to engage students and encourage them to see the real-life applications of ecology. It focuses on the integration of material across the levels at which ecology is studied (from individuals to population[...]
Lebanese writer Venus Khoury-Ghata, who lives in France and has won many of France's major literary prizes, blends French surrealism with Arabic poetry's communal narrative mode in three stunning poetic sequences. Here brilliantly translated from the French by poet Marilyn Hacker, the English-speaki[...]
The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been co[...]
The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been c[...]
Discover all the security risks and exploits that can threaten iOS-based mobile devicesiOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, exp[...]
Written by the world's foremost Android security researchers, Android Hacker's Handbook is the first comprehensive book on detecting and preventing hacks and exploits to the Android operating system.[...]
The browser has become the new operating system of the modern era and with that, security vulnerabilities in all browsers abound. Written by a team of experts, The Browser Hacker's Handbook is the first tutorial-based book on the subject.[...]