Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Sagar Ajay Rahalkar"'
Autor:
Sagar Ajay Rahalkar
Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
The operating system is at the core of any computing system. It acts as a foundation for other applications and utilities. The goal of this chapter is to introduce some basic concepts of operating systems from an ethical hacking perspective.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::990ef5f64ae3adeb565332f4b4e41bfc
https://doi.org/10.1007/978-1-4842-2325-3_1
https://doi.org/10.1007/978-1-4842-2325-3_1
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
Routers, switches, and hubs are some of the networking devices used to establish connectivity among networked devices. However, they don't provide much control over access and security. Securing the network requires special-purpose devices like intru
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eb27a03e1709ea2be4095e2c9d917fee
https://doi.org/10.1007/978-1-4842-2325-3_13
https://doi.org/10.1007/978-1-4842-2325-3_13
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::93fb7cd539a1baf3a7f9d43b8a6be7b3
https://doi.org/10.1007/978-1-4842-2325-3_7
https://doi.org/10.1007/978-1-4842-2325-3_7
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
During the early computing era, hackers and attackers targeted operating systems and infrastructure-level components to compromise the systems. But today’s operating systems and other infrastructure components are comparatively mature in terms of s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ee17d5de369c666cfbdf9a52184372b1
https://doi.org/10.1007/978-1-4842-2325-3_10
https://doi.org/10.1007/978-1-4842-2325-3_10
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
The rise in the use of mobile devices and smartphones has also increased the risk of compromise of sensitive personal data present on these devices. This chapter introduces the two most popular mobile platforms, Android and iOS, along with their secu
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8ab781f7fb2e8349a7e08336f7293299
https://doi.org/10.1007/978-1-4842-2325-3_12
https://doi.org/10.1007/978-1-4842-2325-3_12
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::79147e0faecff0ee2aa70ed82d7eac39
https://doi.org/10.1007/978-1-4842-2325-3_14
https://doi.org/10.1007/978-1-4842-2325-3_14
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a2c23a2aa9eedc3056bfffa1c2bbe404
https://doi.org/10.1007/978-1-4842-2325-3_3
https://doi.org/10.1007/978-1-4842-2325-3_3
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f9f07e63691cb87746afe8458e974c43
https://doi.org/10.1007/978-1-4842-2325-3_8
https://doi.org/10.1007/978-1-4842-2325-3_8
Autor:
Sagar Ajay Rahalkar
Publikováno v:
Certified Ethical Hacker (CEH) Foundation Guide ISBN: 9781484223246
This chapter introduces key concepts and terminology pertaining to information security, which will be frequently used as a base to many other concepts that are part of the CEH course.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::75a7d07401f4f4a71191469c0fecd43b
https://doi.org/10.1007/978-1-4842-2325-3_6
https://doi.org/10.1007/978-1-4842-2325-3_6