ស្វែងរក

Showing posts with label E-concil. Show all posts
Showing posts with label E-concil. Show all posts

Thursday, July 11, 2013

Official Certified Ethical Hacker Review Guide


Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you?ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
Using social media, you can deliver amazing customer service–and generate an army of fans who’ll promote you in good times, and rescue you from disaster. Now, legendary online marketing expert Peter Shankman shows you exactly how to do all that–without spending a fortune! Shankman draws on his immense experience as founder of the online growth company HARO and marketing consultant to multiple Fortune 500 clients. He presents straight-to-the-point solutions for building customer loyalty, trust, and credibility online–and rebuilding it when catastrophe strikes. Companies around the world are driving enormous value from online customer service at remarkably low cost. - See more at: http://shankman.com/books/#sthash.uBqxvJvj.dpuf
Download Link

Ethical Hacking & Countermeasure Threats & Defense Mechanisms





The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack and secure information systems. With the full series of books, the reader will gain in-depth knowledge and practical experience with essential security systems, and become prepared to succeed on the Certified Ethical Hacker, or C|EH, certification from EC-Council. This certification covers a plethora of offensive security topics ranging from how perimeter defenses work, to scanning and attacking simulated networks. A wide variety of tools, viruses, and malware is presented in this and the other four books, providing a complete understanding of the tactics and tools used by hackers. By gaining a thorough understanding of how hackers operate, an Ethical Hacker will be able to set up strong countermeasures and defensive systems to protect an organization's critical infrastructure and information.
Using social media, you can deliver amazing customer service–and generate an army of fans who’ll promote you in good times, and rescue you from disaster. Now, legendary online marketing expert Peter Shankman shows you exactly how to do all that–without spending a fortune! Shankman draws on his immense experience as founder of the online growth company HARO and marketing consultant to multiple Fortune 500 clients. He presents straight-to-the-point solutions for building customer loyalty, trust, and credibility online–and rebuilding it when catastrophe strikes. Companies around the world are driving enormous value from online customer service at remarkably low cost. - See more at: http://shankman.com/books/#sthash.uBqxvJvj.dpuf
Download Link

Penetration Testing Communication Media Testing




The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this series is designed to expose the reader to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Armed with the knowledge from the Security Analyst series, along with proper experience, readers will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organization's infrastructure. The series prepares readers for the EC-Council Certified Security Analyst (E|CSA) certification. Penetration Testing: Network and Perimeter Testing. Network and Perimeter Testing coverage includes firewall and ids penetration testing as well as penetration testing of laptops, PDA's, cellphones, e-mail, and security patches.
Using social media, you can deliver amazing customer service–and generate an army of fans who’ll promote you in good times, and rescue you from disaster. Now, legendary online marketing expert Peter Shankman shows you exactly how to do all that–without spending a fortune! Shankman draws on his immense experience as founder of the online growth company HARO and marketing consultant to multiple Fortune 500 clients. He presents straight-to-the-point solutions for building customer loyalty, trust, and credibility online–and rebuilding it when catastrophe strikes. Companies around the world are driving enormous value from online customer service at remarkably low cost. - See more at: http://shankman.com/books/#sthash.uBqxvJvj.dpuf
Download Link

Wednesday, July 10, 2013

Network Defense Perimeter Defense Mechanisms




The Network Defense Series from EC-Council | Press is comprised of 5 books designed to educate learners from a vendor-neutral standpoint how to defend the networks they manage. This series covers the fundamental skills in evaluating internal and external threats to network security and design, how to enforce network level security policies, and how to ultimately protect an organization's information. The books in the series cover a broad range of topics from secure network fundamentals, protocols & analysis, standards and policy, hardening infrastructure, to configuring IPS, IDS, firewalls, bastion host and honeypots. Learners completing this series will have a full understanding of defensive measures taken to secure their organization's information, and along with the proper experience these books will prepare readers for the EC-Council Network Security Administrator (E|NSA) certification. An organization is only as strong as its weakest link. The same is true in network security. Mis-configurations, outdated software and technical glitches are often the easiest point of entry for a hacker. This book, the third in the series, is designed to teach the potential security practitioner how to harden the network infrastructure, evaluate hardware and software configurations and introduce log analysis, creating a strong foundation for Network Security Troubleshooting, response, and repair
Using social media, you can deliver amazing customer service–and generate an army of fans who’ll promote you in good times, and rescue you from disaster. Now, legendary online marketing expert Peter Shankman shows you exactly how to do all that–without spending a fortune! Shankman draws on his immense experience as founder of the online growth company HARO and marketing consultant to multiple Fortune 500 clients. He presents straight-to-the-point solutions for building customer loyalty, trust, and credibility online–and rebuilding it when catastrophe strikes. Companies around the world are driving enormous value from online customer service at remarkably low cost. - See more at: http://shankman.com/books/#sthash.uBqxvJvj.dpuf
.Download Link