Ethical Hacking And Countermeasures: Web Applications And Data Servers, 2nd Edition by Ec-council Ec-councilEthical Hacking And Countermeasures: Web Applications And Data Servers, 2nd Edition by Ec-council Ec-council

Ethical Hacking And Countermeasures: Web Applications And Data Servers, 2nd Edition

byEc-council Ec-council

Paperback | February 24, 2016

Pricing and Purchase Info

$116.06 online 
$128.95 list price save 9%
Earn 580 plum® points

Prices and offers may vary in store

Quantity:

Ships within 1-2 weeks

Ships free on orders over $25

Not available in stores

about

The EC-Council|Press Ethical Hacking and Countermeasures series is comprised of four books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan, test, hack, and secure information systems. A wide variety of tools, viruses, and malware is presented in these books, providing a complete understanding of the tactics and tools used by hackers. The full series of books helps prepare readers to take and succeed on the C|EH certification exam from EC-Council.
The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in various e-business and security skills. It is the owner and developer of the world famous Certified Ethical Hacker course, Computer Hacking Forensics Investigator program, License Penetration Tester program and ...
Loading
Title:Ethical Hacking And Countermeasures: Web Applications And Data Servers, 2nd EditionFormat:PaperbackDimensions:9.1 × 7.3 × 0.35 inPublished:February 24, 2016Publisher:Course TechnologyLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:1305883454

ISBN - 13:9781305883451

Reviews

Table of Contents

1. Session Hijacking.2. Hacking Web Servers.3. Web Application Vulnerabilities.4. Web-Based Password Cracking Techniques.5. Hacking Web Browsers.6. Hacking Database Servers - SQL Injection