Author: Kimberly Graves
Publisher:
ISBN: 9788126526574
Category :
Languages : en
Pages : 436
Book Description
Market_Desc: Primary Audience: Individuals self-studying for the CEH exam who need a step-by-step guide to using hacking tools and understanding the hacking process. Also, those either with 2+ years of IT security experience or have attended a EC-Council course, and are looking for an exam preparation tool, or need to update their CEH certification. Finally, ideal for test takers looking for extra practice material, such as the exams included on our CD.Secondary Audience: Ideal for those with the following job roles: chief security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Special Features: " Unique Certification--Unlike other popular Security certifications, the CEH is one-of-a-kind certification designed to give the candidate an inside look into the mind of a hacker." Only Study Guide Covering CEH v6--This study aide will prepare certification candidates the latest release of the CEH exam. Ideal for those studying on their own, or the perfect supplement to candidates taking the required CEH v6 course." Security Professionals In Demand--According Computer Security Institute, one in three companies surveyed had a hacker attempt to hack into their system. The need for certified IT Security Professionals is also on the rise." Security Spending on the Rise--According to Forrester, companies are spending on average 10% of their IT budget on security, an increase of 20% from 2007. And 27% of companies surveyed plan to increase security spending in 2009. About The Book: The CEH certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. A CEH is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.This book provides a concise, easy to follow approach to this difficult exam. Focusing 100% on the exam objectives, the CEH: Certified Ethical Hackers Study Guide is designed for those who feel they are ready to attempt this challenging exam. The book also comes with an interactive CD, including two Bonus Exams, a series of Flashcards, and a Glossary of Key Terms.
CEH: CERTIFIED ETHICAL HACKER STUDY GUIDE, EXAM 312-50, EXAM ECO-350 (With CD )
Author: Kimberly Graves
Publisher:
ISBN: 9788126526574
Category :
Languages : en
Pages : 436
Book Description
Market_Desc: Primary Audience: Individuals self-studying for the CEH exam who need a step-by-step guide to using hacking tools and understanding the hacking process. Also, those either with 2+ years of IT security experience or have attended a EC-Council course, and are looking for an exam preparation tool, or need to update their CEH certification. Finally, ideal for test takers looking for extra practice material, such as the exams included on our CD.Secondary Audience: Ideal for those with the following job roles: chief security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Special Features: " Unique Certification--Unlike other popular Security certifications, the CEH is one-of-a-kind certification designed to give the candidate an inside look into the mind of a hacker." Only Study Guide Covering CEH v6--This study aide will prepare certification candidates the latest release of the CEH exam. Ideal for those studying on their own, or the perfect supplement to candidates taking the required CEH v6 course." Security Professionals In Demand--According Computer Security Institute, one in three companies surveyed had a hacker attempt to hack into their system. The need for certified IT Security Professionals is also on the rise." Security Spending on the Rise--According to Forrester, companies are spending on average 10% of their IT budget on security, an increase of 20% from 2007. And 27% of companies surveyed plan to increase security spending in 2009. About The Book: The CEH certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. A CEH is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.This book provides a concise, easy to follow approach to this difficult exam. Focusing 100% on the exam objectives, the CEH: Certified Ethical Hackers Study Guide is designed for those who feel they are ready to attempt this challenging exam. The book also comes with an interactive CD, including two Bonus Exams, a series of Flashcards, and a Glossary of Key Terms.
Publisher:
ISBN: 9788126526574
Category :
Languages : en
Pages : 436
Book Description
Market_Desc: Primary Audience: Individuals self-studying for the CEH exam who need a step-by-step guide to using hacking tools and understanding the hacking process. Also, those either with 2+ years of IT security experience or have attended a EC-Council course, and are looking for an exam preparation tool, or need to update their CEH certification. Finally, ideal for test takers looking for extra practice material, such as the exams included on our CD.Secondary Audience: Ideal for those with the following job roles: chief security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Special Features: " Unique Certification--Unlike other popular Security certifications, the CEH is one-of-a-kind certification designed to give the candidate an inside look into the mind of a hacker." Only Study Guide Covering CEH v6--This study aide will prepare certification candidates the latest release of the CEH exam. Ideal for those studying on their own, or the perfect supplement to candidates taking the required CEH v6 course." Security Professionals In Demand--According Computer Security Institute, one in three companies surveyed had a hacker attempt to hack into their system. The need for certified IT Security Professionals is also on the rise." Security Spending on the Rise--According to Forrester, companies are spending on average 10% of their IT budget on security, an increase of 20% from 2007. And 27% of companies surveyed plan to increase security spending in 2009. About The Book: The CEH certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. A CEH is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.This book provides a concise, easy to follow approach to this difficult exam. Focusing 100% on the exam objectives, the CEH: Certified Ethical Hackers Study Guide is designed for those who feel they are ready to attempt this challenging exam. The book also comes with an interactive CD, including two Bonus Exams, a series of Flashcards, and a Glossary of Key Terms.
CEH Certified Ethical Hacker Study Guide
Author: Kimberly Graves
Publisher: John Wiley & Sons
ISBN: 0470642882
Category : Study Aids
Languages : en
Pages : 424
Book Description
Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf
Publisher: John Wiley & Sons
ISBN: 0470642882
Category : Study Aids
Languages : en
Pages : 424
Book Description
Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350 Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book. What's Inside: Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with an assessment test, review questions, practice exams, electronic flashcards, and the entire book in a searchable pdf
CEH: Certified Ethical Hacker Version 8 Study Guide
Author: Sean-Philip Oriyano
Publisher: John Wiley & Sons
ISBN: 1118989287
Category : Computers
Languages : en
Pages : 514
Book Description
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards. Security remains the fastest growing segment of IT, and CEH certification provides unique skills The CEH also satisfies the Department of Defense’s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course Covers all the exam objectives with an easy-to-follow approach Companion website includes practice exam questions, flashcards, and a searchable Glossary of key terms CEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when you're ready to tackle this challenging exam Also available as a set, Ethical Hacking and Web Hacking Set, 9781119072171 with The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition.
Publisher: John Wiley & Sons
ISBN: 1118989287
Category : Computers
Languages : en
Pages : 514
Book Description
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that covers all of the exam objectives and includes numerous examples and hands-on exercises. Coverage includes cryptography, footprinting and reconnaissance, scanning networks, enumeration of services, gaining access to a system, Trojans, viruses, worms, covert channels, and much more. A companion website includes additional study tools, Including practice exam and chapter review questions and electronic flashcards. Security remains the fastest growing segment of IT, and CEH certification provides unique skills The CEH also satisfies the Department of Defense’s 8570 Directive, which requires all Information Assurance government positions to hold one of the approved certifications This Sybex study guide is perfect for candidates studying on their own as well as those who are taking the CEHv8 course Covers all the exam objectives with an easy-to-follow approach Companion website includes practice exam questions, flashcards, and a searchable Glossary of key terms CEHv8: Certified Ethical Hacker Version 8 Study Guide is the book you need when you're ready to tackle this challenging exam Also available as a set, Ethical Hacking and Web Hacking Set, 9781119072171 with The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws, 2nd Edition.
The CEH Prep Guide
Author: Ronald L. Krutz
Publisher: John Wiley & Sons
ISBN: 0470231386
Category : Computers
Languages : en
Pages : 770
Book Description
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
Publisher: John Wiley & Sons
ISBN: 0470231386
Category : Computers
Languages : en
Pages : 770
Book Description
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests
CEH v9
Author: Sean-Philip Oriyano
Publisher: John Wiley & Sons
ISBN: 111925227X
Category : Computers
Languages : en
Pages : 651
Book Description
The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. Review all CEH v9 topics systematically Reinforce critical skills with hands-on exercises Learn how concepts apply in real-world scenarios Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam—making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors.
Publisher: John Wiley & Sons
ISBN: 111925227X
Category : Computers
Languages : en
Pages : 651
Book Description
The ultimate preparation guide for the unique CEH exam. The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material. The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with specific coverage of all CEH objectives and plenty of practice material. Review all CEH v9 topics systematically Reinforce critical skills with hands-on exercises Learn how concepts apply in real-world scenarios Identify key proficiencies prior to the exam The CEH certification puts you in professional demand, and satisfies the Department of Defense's 8570 Directive for all Information Assurance government positions. Not only is it a highly-regarded credential, but it's also an expensive exam—making the stakes even higher on exam day. The CEH v9: Certified Ethical Hacker Version 9 Study Guide gives you the intense preparation you need to pass with flying colors.
CEH v10 Certified Ethical Hacker Study Guide
Author: Ric Messier
Publisher: John Wiley & Sons
ISBN: 1119533260
Category : Computers
Languages : en
Pages : 675
Book Description
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
Publisher: John Wiley & Sons
ISBN: 1119533260
Category : Computers
Languages : en
Pages : 675
Book Description
As protecting information becomes a rapidly growing concern for today’s businesses, certifications in IT security have become highly desirable, even as the number of certifications has grown. Now you can set yourself apart with the Certified Ethical Hacker (CEH v10) certification. The CEH v10 Certified Ethical Hacker Study Guide offers a comprehensive overview of the CEH certification requirements using concise and easy-to-follow instruction. Chapters are organized by exam objective, with a handy section that maps each objective to its corresponding chapter, so you can keep track of your progress. The text provides thorough coverage of all topics, along with challenging chapter review questions and Exam Essentials, a key feature that identifies critical study areas. Subjects include intrusion detection, DDoS attacks, buffer overflows, virus creation, and more. This study guide goes beyond test prep, providing practical hands-on exercises to reinforce vital skills and real-world scenarios that put what you’ve learned into the context of actual job roles. Gain a unique certification that allows you to understand the mind of a hacker Expand your career opportunities with an IT certificate that satisfies the Department of Defense’s 8570 Directive for Information Assurance positions Fully updated for the 2018 CEH v10 exam, including the latest developments in IT security Access the Sybex online learning center, with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms Thanks to its clear organization, all-inclusive coverage, and practical instruction, the CEH v10 Certified Ethical Hacker Study Guide is an excellent resource for anyone who needs to understand the hacking process or anyone who wants to demonstrate their skills as a Certified Ethical Hacker.
CEH Certified Ethical Hacker All-in-One Exam Guide
Author: Matt Walker
Publisher: McGraw Hill Professional
ISBN: 0071772286
Category : Computers
Languages : en
Pages : 420
Book Description
Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL EXAM TOPICS, INCLUDING: Introduction to ethical hacking Cryptography Reconnaissance and footprinting Network scanning Enumeration System hacking Evasion techniques Social engineering and physical security Hacking web servers and applications SQL injection Viruses, trojans, and other attacks Wireless hacking Penetration testing Electronic content includes: Two practice exams Bonus appendix with author's recommended tools, sites, and references
Publisher: McGraw Hill Professional
ISBN: 0071772286
Category : Computers
Languages : en
Pages : 420
Book Description
Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL EXAM TOPICS, INCLUDING: Introduction to ethical hacking Cryptography Reconnaissance and footprinting Network scanning Enumeration System hacking Evasion techniques Social engineering and physical security Hacking web servers and applications SQL injection Viruses, trojans, and other attacks Wireless hacking Penetration testing Electronic content includes: Two practice exams Bonus appendix with author's recommended tools, sites, and references
CEH Certified Ethical Hacker Practice Exams
Author: Matthew Walker
Publisher:
ISBN: 9780071810234
Category : Computer networks
Languages : en
Pages : 305
Book Description
Designed as an exam-focused study-self aid and resource, 'CEH Certified Ethical Hacker Practice Exams' offers practice test items from each domain of the latest CEH exam, and provides knowledge and scenario-based questions plus one case study-based Lab Question per chapter. In-depth answer explanations for both the correct and incorrect answers are included.
Publisher:
ISBN: 9780071810234
Category : Computer networks
Languages : en
Pages : 305
Book Description
Designed as an exam-focused study-self aid and resource, 'CEH Certified Ethical Hacker Practice Exams' offers practice test items from each domain of the latest CEH exam, and provides knowledge and scenario-based questions plus one case study-based Lab Question per chapter. In-depth answer explanations for both the correct and incorrect answers are included.
Kali Linux - An Ethical Hacker's Cookbook
Author: Himanshu Sharma
Publisher: Packt Publishing Ltd
ISBN: 1787120287
Category : Computers
Languages : en
Pages : 366
Book Description
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
Publisher: Packt Publishing Ltd
ISBN: 1787120287
Category : Computers
Languages : en
Pages : 366
Book Description
Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book Practical recipes to conduct effective penetration testing using the powerful Kali Linux Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn Installing, setting up and customizing Kali for pentesting on multiple platforms Pentesting routers and embedded devices Bug hunting 2017 Pwning and escalating through corporate network Buffer overflows 101 Auditing wireless networks Fiddling around with software-defned radio Hacking on the run with NetHunter Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.
Certified Ethical Hacker (CEH) Cert Guide
Author: Michael Gregg
Publisher: Pearson Education
ISBN: 0789751275
Category : Computers
Languages : en
Pages : 746
Book Description
Accompanying CD-ROM contains: Pearson IT Certification Practice Test Engine, with two practice exams and access to a large library of exam-realistic questions; memory tables, lists, and other resources, all in searchable PDF format.
Publisher: Pearson Education
ISBN: 0789751275
Category : Computers
Languages : en
Pages : 746
Book Description
Accompanying CD-ROM contains: Pearson IT Certification Practice Test Engine, with two practice exams and access to a large library of exam-realistic questions; memory tables, lists, and other resources, all in searchable PDF format.