Goodreads helps you keep track of books you want to read.
Start by marking “Ceh Certified Ethical Hacker Study Guide” as Want to Read:
Ceh Certified Ethical Hacker Study Guide
Enlarge cover
Rate this book
Clear rating
Open Preview

Ceh Certified Ethical Hacker Study Guide

3.98  ·  Rating Details ·  86 Ratings  ·  6 Reviews
Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key ...more
ebook, 432 pages
Published June 3rd 2010 by Sybex (first published April 9th 2010)
More Details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.
This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-30)
filter  |  sort: default (?)  |  Rating Details
N
Jul 05, 2012 N rated it it was amazing  ·  review of another edition
Great book for precise information about Security concepts and CEH. I made notes from it and cleared the exam :)
Brennan
Mar 13, 2014 Brennan rated it really liked it  ·  review of another edition
This review has been hidden because it contains spoilers. To view it, click here.
Galih Satria
Jun 02, 2012 Galih Satria rated it really liked it  ·  review of another edition
Sebenarnya tidak ada yang baru dari pertama kali saya baca buku Hacking Exposed dan The Art of Hacking pada waktu kuliah dulu. Teknik penjebolan sistem nya masih seputar vulnerability scanning, buffer overflow, sql injection, xss, dsb. Tapi meski hanya "begitu-begitu" saja, masih banyak sistem di dunia ini yang tidak dikonfigurasi dengan rapi sehingga yang "begitu-begitu" pun bisa dipakai. Tools untuk hacking semakin banyak, bikin makin pusing setiap network and security analyst.

Meskipun tools
...more
Saber GRAF
Saber GRAF rated it liked it
Jul 13, 2016
Awolude
Awolude rated it it was amazing
Apr 02, 2013
Divya.m
This review has been hidden because it contains spoilers. To view it, click here.
Admod
Admod rated it it was amazing
Feb 09, 2014
Meily
Meily rated it it was amazing
Dec 31, 2015
Pooya Taheri
Pooya Taheri rated it really liked it
Jan 25, 2015
Sansan Tan
Sansan Tan rated it liked it
Nov 11, 2014
Mohammed Abdi
Mohammed Abdi rated it it was amazing
Feb 12, 2016
Barry
Barry rated it really liked it
Sep 18, 2015
Youness Idihoum
Youness Idihoum rated it it was amazing
Sep 14, 2013
Jamar Helton
Jamar Helton rated it really liked it
Feb 05, 2013
Jay
Jay rated it liked it
Dec 28, 2011
Joe
Joe rated it liked it
Jun 12, 2012
Ricardo
Ricardo rated it it was amazing
Mar 07, 2016
Josh
Josh rated it liked it
Aug 11, 2014
Martin
Martin rated it liked it
Jun 09, 2013
Ashwani56
Ashwani56 rated it liked it
Jul 17, 2014
Ashwani56
Ashwani56 rated it liked it
Jul 17, 2014
Karanpreet Singh
Karanpreet Singh rated it it was amazing
May 31, 2016
Awolude
Awolude rated it it was amazing
Apr 02, 2013
Mohamed Nabil
Mohamed Nabil rated it it was amazing
Feb 18, 2016
Jon
Jon rated it really liked it
Aug 10, 2012
Brad
Brad rated it it was ok
Feb 09, 2012
Haitham Saad
Haitham Saad rated it really liked it
Nov 25, 2015
Mario Peterson
Mario Peterson rated it really liked it
May 12, 2016
Dinesh
Dinesh rated it it was amazing
Nov 13, 2013
« previous 1 3 next »
There are no discussion topics on this book yet. Be the first to start one »
  • Metasploit: The Penetration Tester's Guide
  • CEH Certified Ethical Hacker All-in-One Exam Guide
  • The Art of Software Security Assessment: Identifying and Avoiding Software Vulnerabilities
  • Gray Hat Python: Python Programming for Hackers and Reverse Engineers
  • Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
  • Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
  • Gray Hat Hacking: The Ethical Hacker's Handbook
  • The Tangled Web: A Guide to Securing Modern Web Applications
  • Backtrack 5 Wireless Penetration Testing Beginner's Guide
  • Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  • The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  • The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
  • Security Engineering: A Guide to Building Dependable Distributed Systems
  • The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
  • Thinking in C++, Vol. 2: Practical Programming
  • Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code
  • Reversing: Secrets of Reverse Engineering
  • Unmasking the Social Engineer: The Human Element of Security

Goodreads is hiring!

If you like books and love to build cool products, we may be looking for you.
Learn more »

Share This Book