000 | 03956cam a2200673Ii 4500 | ||
---|---|---|---|
001 | ocn918135837 | ||
003 | OCoLC | ||
005 | 20171024101629.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150813t20152015inua o 001 0 eng d | ||
010 | _a 2015946971 | ||
020 |
_a9781119183433 _qelectronic bk. |
||
020 |
_a111918343X _qelectronic bk. |
||
020 |
_a9781118987155 _q(electronic bk.) |
||
020 |
_a1118987152 _q(electronic bk.) |
||
020 |
_a9781118987131 _q(electronic bk.) |
||
020 |
_a1118987136 _q(electronic bk.) |
||
020 | _z9781118987056 | ||
020 | _a1118987055 | ||
020 | _a9781118987056 | ||
029 | 1 |
_aDEBSZ _b445070870 |
|
029 | 1 |
_aGBVCP _b835784924 |
|
029 | 1 |
_aNZ1 _b16241486 |
|
029 | 1 |
_aDEBBG _bBV043397987 |
|
029 | 1 |
_aDEBBG _bBV043892433 |
|
029 | 1 |
_aDEBBG _bBV043968732 |
|
035 |
_a(OCoLC)918135837 _z(OCoLC)936042537 _z(OCoLC)957021819 _z(OCoLC)957184627 _z(OCoLC)957303245 _z(OCoLC)967626152 |
||
037 |
_aCL0500000707 _bSafari Books Online |
||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dYDXCP _dIDEBK _dDG1 _dCDX _dCOO _dDEBSZ _dOCLCF _dOCLCQ _dSTF _dB24X7 _dUMI _dEBLCP _dYDX _dDEBBG _dRECBK _dCCO _dVT2 |
||
049 | _aMAIN | ||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aGregg, Michael _q(Michael C.), _eauthor. |
|
245 | 1 | 4 |
_aThe network security test lab : a step-by-step guide / _cMichael Gregg. _h[electronic resource] |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c[2015] |
|
264 | 4 | _c©2015 | |
300 |
_a1 online resource : _bcolor illustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
500 | _aIncludes index. | ||
505 | 0 | _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection. | |
520 |
_aThis book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. -- _cEdited summary from book. |
||
588 | 0 | _aOnline resource; title from PDF title page (Ebsco, viewed Aug. 17, 2015). | |
650 | 0 |
_aComputer security _xEvaluation. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS /Networking / Security _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security _xEvaluation. _2fast _0(OCoLC)fst00872488 |
|
655 | 0 | _aElectronic books. | |
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aGregg, Michael. _tNetwork security test lab : a step-by-step guide. _dIndianapolis, Indiana : Wiley, c2015 _hxxiv, 455 pages _z9781118987056 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183433 _zWiley Online Library |
942 |
_2ddc _cBK |
||
999 |
_c208140 _d208140 |