Library Logo

The network security test lab : a step-by-step guide / (Record no. 208140)

000 -LEADER
fixed length control field 03956cam a2200673Ii 4500
001 - CONTROL NUMBER
control field ocn918135837
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171024101629.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150813t20152015inua o 001 0 eng d
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2015946971
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119183433
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111918343X
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118987155
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118987152
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118987131
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118987136
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118987056
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118987055
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118987056
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 445070870
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier GBVCP
System control number 835784924
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 16241486
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043397987
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043892433
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043968732
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)918135837
Canceled/invalid control number (OCoLC)936042537
-- (OCoLC)957021819
-- (OCoLC)957184627
-- (OCoLC)957303245
-- (OCoLC)967626152
037 ## - SOURCE OF ACQUISITION
Stock number CL0500000707
Source of stock number/acquisition Safari Books Online
040 ## - CATALOGING SOURCE
Original cataloging agency N$T
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency N$T
Modifying agency N$T
-- YDXCP
-- IDEBK
-- DG1
-- CDX
-- COO
-- DEBSZ
-- OCLCF
-- OCLCQ
-- STF
-- B24X7
-- UMI
-- EBLCP
-- YDX
-- DEBBG
-- RECBK
-- CCO
-- VT2
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 043050
Source bisacsh
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Gregg, Michael
Fuller form of name (Michael C.),
Relator term author.
245 14 - TITLE STATEMENT
Title The network security test lab : a step-by-step guide /
Statement of responsibility, etc. Michael Gregg.
Medium [electronic resource]
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Indianapolis, IN :
Name of producer, publisher, distributor, manufacturer Wiley,
Date of production, publication, distribution, manufacture, or copyright notice [2015]
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Date of production, publication, distribution, manufacture, or copyright notice ©2015
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource :
Other physical details color illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Building a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
520 ## - SUMMARY, ETC.
Summary, etc. This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. --
Assigning source Edited summary from book.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (Ebsco, viewed Aug. 17, 2015).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Evaluation.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS /Networking / Security
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS / Security / General
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer networks
General subdivision Security measures.
Source of heading or term fast
Authority record control number (OCoLC)fst00872341
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Evaluation.
Source of heading or term fast
Authority record control number (OCoLC)fst00872488
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Gregg, Michael.
Title Network security test lab : a step-by-step guide.
Place, publisher, and date of publication Indianapolis, Indiana : Wiley, c2015
Physical description xxiv, 455 pages
International Standard Book Number 9781118987056
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://onlinelibrary.wiley.com/book/10.1002/9781119183433
Public note Wiley Online Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login