|
|
|
|
LEADER |
03964nam a2200673 4500 |
001 |
ocn918135837 |
003 |
OCoLC |
005 |
20170124071811.5 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150813t20152015inua o 001 0 eng d |
010 |
|
|
|a 2015946971
|
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d YDXCP
|d IDEBK
|d DG1
|d CDX
|d COO
|d DEBSZ
|d OCLCF
|d OCLCQ
|d STF
|d B24X7
|d UMI
|d EBLCP
|d YDX
|d DEBBG
|d RECBK
|d CCO
|d VT2
|d GrThAP
|
019 |
|
|
|a 936042537
|a 957021819
|a 957184627
|a 957303245
|a 967626152
|
020 |
|
|
|a 9781119183433
|q electronic bk.
|
020 |
|
|
|a 111918343X
|q electronic bk.
|
020 |
|
|
|a 9781118987155
|q (electronic bk.)
|
020 |
|
|
|a 1118987152
|q (electronic bk.)
|
020 |
|
|
|a 9781118987131
|q (electronic bk.)
|
020 |
|
|
|a 1118987136
|q (electronic bk.)
|
020 |
|
|
|z 9781118987056
|
020 |
|
|
|a 1118987055
|
020 |
|
|
|a 9781118987056
|
029 |
1 |
|
|a DEBSZ
|b 445070870
|
029 |
1 |
|
|a GBVCP
|b 835784924
|
029 |
1 |
|
|a NZ1
|b 16241486
|
029 |
1 |
|
|a DEBBG
|b BV043397987
|
029 |
1 |
|
|a DEBBG
|b BV043892433
|
029 |
1 |
|
|a DEBBG
|b BV043968732
|
035 |
|
|
|a (OCoLC)918135837
|z (OCoLC)936042537
|z (OCoLC)957021819
|z (OCoLC)957184627
|z (OCoLC)957303245
|z (OCoLC)967626152
|
037 |
|
|
|a CL0500000707
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a MAIN
|
100 |
1 |
|
|a Gregg, Michael
|q (Michael C.),
|e author.
|
245 |
1 |
4 |
|a The network security test lab :
|b a step-by-step guide /
|c Michael Gregg.
|
264 |
|
1 |
|a Indianapolis, IN :
|b Wiley,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource :
|b color illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Building a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
|
588 |
0 |
|
|a Online resource; title from PDF title page (Ebsco, viewed Aug. 17, 2015).
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. --
|c Edited summary from book.
|
650 |
|
0 |
|a Computer security
|x Evaluation.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
7 |
|a COMPUTERS /Networking / Security
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS / Security / General
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security
|x Evaluation.
|2 fast
|0 (OCoLC)fst00872488
|
655 |
|
0 |
|a Electronic books.
|
655 |
|
4 |
|a Electronic books.
|
776 |
0 |
8 |
|i Print version:
|a Gregg, Michael.
|t Network security test lab : a step-by-step guide.
|d Indianapolis, Indiana : Wiley, c2015
|h xxiv, 455 pages
|z 9781118987056
|
856 |
4 |
0 |
|u https://doi.org/10.1002/9781119183433
|z Full Text via HEAL-Link
|
994 |
|
|
|a 92
|b DG1
|