000 03956cam a2200673Ii 4500
001 ocn918135837
003 OCoLC
005 20171024101629.0
006 m o d
007 cr cnu|||unuuu
008 150813t20152015inua o 001 0 eng d
010 _a 2015946971
020 _a9781119183433
_qelectronic bk.
020 _a111918343X
_qelectronic bk.
020 _a9781118987155
_q(electronic bk.)
020 _a1118987152
_q(electronic bk.)
020 _a9781118987131
_q(electronic bk.)
020 _a1118987136
_q(electronic bk.)
020 _z9781118987056
020 _a1118987055
020 _a9781118987056
029 1 _aDEBSZ
_b445070870
029 1 _aGBVCP
_b835784924
029 1 _aNZ1
_b16241486
029 1 _aDEBBG
_bBV043397987
029 1 _aDEBBG
_bBV043892433
029 1 _aDEBBG
_bBV043968732
035 _a(OCoLC)918135837
_z(OCoLC)936042537
_z(OCoLC)957021819
_z(OCoLC)957184627
_z(OCoLC)957303245
_z(OCoLC)967626152
037 _aCL0500000707
_bSafari Books Online
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dYDXCP
_dIDEBK
_dDG1
_dCDX
_dCOO
_dDEBSZ
_dOCLCF
_dOCLCQ
_dSTF
_dB24X7
_dUMI
_dEBLCP
_dYDX
_dDEBBG
_dRECBK
_dCCO
_dVT2
049 _aMAIN
050 4 _aQA76.9.A25
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aGregg, Michael
_q(Michael C.),
_eauthor.
245 1 4 _aThe network security test lab : a step-by-step guide /
_cMichael Gregg.
_h[electronic resource]
264 1 _aIndianapolis, IN :
_bWiley,
_c[2015]
264 4 _c©2015
300 _a1 online resource :
_bcolor illustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aIncludes index.
505 0 _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
520 _aThis book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. --
_cEdited summary from book.
588 0 _aOnline resource; title from PDF title page (Ebsco, viewed Aug. 17, 2015).
650 0 _aComputer security
_xEvaluation.
650 0 _aComputer networks
_xSecurity measures.
650 7 _aCOMPUTERS /Networking / Security
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security
_xEvaluation.
_2fast
_0(OCoLC)fst00872488
655 0 _aElectronic books.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aGregg, Michael.
_tNetwork security test lab : a step-by-step guide.
_dIndianapolis, Indiana : Wiley, c2015
_hxxiv, 455 pages
_z9781118987056
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183433
_zWiley Online Library
942 _2ddc
_cBK
999 _c208140
_d208140