Ahmed Sheikh
- Auteur
Geschreven door Ahmed Sheikh
Ahmed Sheikh
Certified Ethical Hacker (CEH) Preparation Guide
You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting.
Meer