<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>01377pamaa2200241   4500</leader>
  <controlfield tag="001">0000046415</controlfield>
  <controlfield tag="005">20130117090000.0</controlfield>
  <controlfield tag="008">091207                             eng  </controlfield>
  <datafield tag="020" ind1="0" ind2="0">
   <subfield code="a">9780782144376 (pbk.) </subfield>
  </datafield>
  <datafield tag="090" ind1="0" ind2="0">
   <subfield code="a">QA76.3 </subfield>
   <subfield code="b">GRA 2007</subfield>
  </datafield>
  <datafield tag="100" ind1="1" ind2="0">
   <subfield code="a">Graves </subfield>
  </datafield>
  <datafield tag="245" ind1="1" ind2="0">
   <subfield code="a">CEH : </subfield>
   <subfield code="b">official certified ethical hacker review guide  </subfield>
   <subfield code="c">Kimberly Graves.</subfield>
  </datafield>
  <datafield tag="260" ind1="0" ind2="0">
   <subfield code="a">Indianapolis, Ind.: </subfield>
   <subfield code="b">Wiley Pub., </subfield>
   <subfield code="c">2007.</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">xxii, 238 p.: </subfield>
   <subfield code="b">ill.; </subfield>
   <subfield code="c">23 cm.</subfield>
  </datafield>
  <datafield tag="500" ind1="0" ind2="0">
   <subfield code="a">Includes index</subfield>
  </datafield>
  <datafield tag="500" ind1="0" ind2="0">
   <subfield code="a">Includes 1 CD-ROM titled &quot;CEH : official certified ethical hacker review guide / Kimberly Graves&quot;</subfield>
  </datafield>
  <datafield tag="500" ind1="0" ind2="0">
   <subfield code="a">Exam 312-50</subfield>
  </datafield>
  <datafield tag="501" ind1="0" ind2="0">
   <subfield code="a">BITCUN</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2="0">
   <subfield code="a">Introduction to ethical hacking, ethics, and legality -- Footprinting and social engineering -- Scanning and enumeration -- System hacking -- Trojans, backdoors, viruses, and worms -- Sniffers -- Denial of service and session hijacking -- Hacking Web servers, Web application vulnerabilities, and Web-based password cracking techniques -- SQL injection and buffer overflows -- Wireless hacking -- Physical security -- Linux hacking -- Evading IDSs, honeypots, and firewalls -- Cryptography -- Penetration testing methodologies</subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Electronic data processing personnel -- </subfield>
   <subfield code="x">Certification </subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer hackers </subfield>
  </datafield>
  <datafield tag="650" ind1="0" ind2="0">
   <subfield code="a">Computer security -- </subfield>
   <subfield code="x">Examinations -- </subfield>
   <subfield code="x">Study guides </subfield>
  </datafield>
  <datafield tag="901" ind1=" " ind2=" ">
   <subfield code="u">http://www.sybex.com</subfield>
  </datafield>
 </record>
</collection>
