Series: All-in-One
Paperback: 748 pages
Publisher: McGraw-Hill Education; 2 edition (October 9, 2014)
Language: English
ISBN-10: 0071835571
ISBN-13: 978-0071835572
Product Dimensions: 7.4 x 1.7 x 9.1 inches
Shipping Weight: 3.2 pounds (View shipping rates and policies)
Average Customer Review: 4.2 out of 5 stars See all reviews (29 customer reviews)
Best Sellers Rank: #408,747 in Books (See Top 100 in Books) #80 in Books > Computers & Technology > Hardware & DIY > Internet & Networking #89 in Books > Computers & Technology > Security & Encryption > Viruses #102 in Books > Business & Money > Accounting > Auditing
Despite some significant shortcomings, this book is a good learning tool for those who expect to sit for the ECC's CEH exam. It was my primary reference during my exam prep, and I passed handily.. So if passing the CEH certification test is your goal, I do recommend it, and consider it better than any other book that I've seen for that purpose. In fairness, the author does not purport to provide more than is needed to pass the CEH certification exam: he notes in the introduction, "I didn't bother to drill down into the basics in this book because it would have been 20000 pages long ...". Well I would not have wanted 20000 more pages, but an additional 20 or 30 could have been put to good use. As a minor example, one of the correct answers in my test was "bollards", those obnoxious concrete cylinders that crop up around various buildings in an effort to keep terrorist vehicles at a distance from the building. While I won't swear to it, I don't think bollards are mentioned in the book.More serious, as other reviewers have noted, are the errors in this book. For example, on p. 94, in a discussion of nmap, the author states that an ACK scan elicits no response from a closed port, but prompts an RST from an open port, implying that the ACK scan can distinguish open and closed ports. He also stated, on p.92, "ACK scans ... determine what ports may be open on a firewall". Now I have not tested his claims, but Fyodor, in Section 15.6 of his superb book on nmap, states the following with regard to the ACK scan:"This scan is different than the others discussed so far in that it never determines open or even open|filtered ports. It is used to map out firewall rule sets ...
CEH Certified Ethical Hacker Bundle, Second Edition (All-in-One) CEH Certified Ethical Hacker Bundle, Third Edition (All-In-One) CEH Certified Ethical Hacker All-in-One Exam Guide, Second Edition CEH Certified Ethical Hacker All-in-One Exam Guide, Third Edition CEH Certified Ethical Hacker: Exam Guide (All-in-One) CEH v9: Certified Ethical Hacker Version 9 Kit CEH v9: Certified Ethical Hacker Version 9 Study Guide Adobe Certified Expert (ACE) Secrets To Acing The Exam and Successful Finding And Landing Your Next Adobe Certified Expert (ACE) Certified Job Adobe Certified Instructor (ACI) Secrets To Acing The Exam and Successful Finding And Landing Your Next Adobe Certified Instructor (ACI) Certified Job Graphic Artist's Guild Handbook of Pricing and Ethical Guidelines (Graphic Artists Guild Handbook: Pricing & Ethical Guidelines) Ethical and Legal Issues for Imaging Professionals, 2e (Towsley-Cook, Ethical and Legal Issues for Imaging Professionals) One Bundle of Fun: Turn Any Bundle, Roll, or Pack into a Great Quilt Grammar of the Shot, Motion Picture and Video Lighting, and Cinematography Bundle: Grammar of the Shot, Second Edition 2nd (second) Edition by Bowen, Christopher J., Thompson, Roy published by Focal Press (2009) Learn Adobe Illustrator CC for Graphic Design and Illustration: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA)) Learn Adobe Premiere Pro CC for Video Communication: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA)) Learn Adobe Photoshop CC for Visual Communication: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA)) Learn Adobe Dreamweaver CC for Web Authoring: Adobe Certified Associate Exam Preparation (Adobe Certified Associate (ACA)) Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy SSCP Systems Security Certified Practitioner All-in-One Exam Guide