Graves, Kimberly2018-10-292018-10-2920102010978-0-470-52520-3http://196.43.179.3:8080/xmlui/handle/123456789/6611.Ethics and Legality; 2.Footprinting; 3.Scanning; 4.System Hacking; 5.Trojans and Backdoors; 6.Sniffers; 7.Denial of Service; 8.Hacking Web Servers; 9.SQL Injection; 10.Wireless Hacking...en-USElectronic data processing personnelComputer securityComputer hackersComputer networksCEH certified ethical hacker exam : study gudeBook