The network security test lab : a step-by-step guide / (Record no. 208140)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03956cam a2200673Ii 4500 |
001 - CONTROL NUMBER | |
control field | ocn918135837 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20171024101629.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 150813t20152015inua o 001 0 eng d |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2015946971 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119183433 |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 111918343X |
Qualifying information | electronic bk. |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118987155 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118987152 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118987131 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118987136 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118987056 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118987055 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118987056 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 445070870 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | GBVCP |
System control number | 835784924 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | NZ1 |
System control number | 16241486 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043397987 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043892433 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043968732 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)918135837 |
Canceled/invalid control number | (OCoLC)936042537 |
-- | (OCoLC)957021819 |
-- | (OCoLC)957184627 |
-- | (OCoLC)957303245 |
-- | (OCoLC)967626152 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | CL0500000707 |
Source of stock number/acquisition | Safari Books Online |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | N$T |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | N$T |
Modifying agency | N$T |
-- | YDXCP |
-- | IDEBK |
-- | DG1 |
-- | CDX |
-- | COO |
-- | DEBSZ |
-- | OCLCF |
-- | OCLCQ |
-- | STF |
-- | B24X7 |
-- | UMI |
-- | EBLCP |
-- | YDX |
-- | DEBBG |
-- | RECBK |
-- | CCO |
-- | VT2 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 043050 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 053000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Gregg, Michael |
Fuller form of name | (Michael C.), |
Relator term | author. |
245 14 - TITLE STATEMENT | |
Title | The network security test lab : a step-by-step guide / |
Statement of responsibility, etc. | Michael Gregg. |
Medium | [electronic resource] |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Indianapolis, IN : |
Name of producer, publisher, distributor, manufacturer | Wiley, |
Date of production, publication, distribution, manufacture, or copyright notice | [2015] |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2015 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource : |
Other physical details | color illustrations |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
500 ## - GENERAL NOTE | |
General note | Includes index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Building a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. -- |
Assigning source | Edited summary from book. |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from PDF title page (Ebsco, viewed Aug. 17, 2015). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
General subdivision | Evaluation. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS /Networking / Security |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS / Security / General |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer networks |
General subdivision | Security measures. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872341 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security |
General subdivision | Evaluation. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00872488 |
655 #0 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Gregg, Michael. |
Title | Network security test lab : a step-by-step guide. |
Place, publisher, and date of publication | Indianapolis, Indiana : Wiley, c2015 |
Physical description | xxiv, 455 pages |
International Standard Book Number | 9781118987056 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://onlinelibrary.wiley.com/book/10.1002/9781119183433 |
Public note | Wiley Online Library |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
No items available.