Cyber Operations Building, Defending, and Attacking Modern Computer Networks /
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You wil...
| Main Author: | O'Leary, Mike (Author, http://id.loc.gov/vocabulary/relators/aut) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berkeley, CA :
Apress : Imprint: Apress,
2019.
|
| Edition: | 2nd ed. 2019. |
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Cyber Operations Building, Defending, and Attacking Modern Computer Networks /
by: O'Leary, Mike
Published: (2015) -
Waging Cyber War Technical Challenges and Operational Constraints /
by: Oakley, Jacob G., et al.
Published: (2019) -
Privileged Attack Vectors Building Effective Cyber-Defense Strategies to Protect Organizations /
by: Haber, Morey J., et al.
Published: (2018) -
Asset Attack Vectors Building Effective Vulnerability Management Strategies to Protect Organizations /
by: Haber, Morey J., et al.
Published: (2018) -
Ransomware Revealed A Beginner's Guide to Protecting and Recovering from Ransomware Attacks /
by: Hassan, Nihad A., et al.
Published: (2019)