000 | 04534cam a2200793Ii 4500 | ||
---|---|---|---|
001 | sulb-eb0033988 | ||
003 | BD-SySUS | ||
005 | 20170713221425.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150813t20152015inua o 001 0 eng d | ||
010 | _a 2015946971 | ||
040 |
_aN$T _beng _erda _epn _cN$T _dN$T _dYDXCP _dIDEBK _dDG1 _dCDX _dCOO _dDEBSZ _dOCLCF _dOCLCQ _dSTF _dB24X7 _dUMI _dEBLCP _dYDX _dDEBBG _dRECBK _dCCO _dVT2 _dBD-SySUS |
||
019 |
_a936042537 _a957021819 _a957184627 _a957303245 _a967626152 |
||
020 |
_a9781119183433 _qelectronic bk. |
||
020 |
_a111918343X _qelectronic bk. |
||
020 |
_a9781118987155 _q(electronic bk.) |
||
020 |
_a1118987152 _q(electronic bk.) |
||
020 |
_a9781118987131 _q(electronic bk.) |
||
020 |
_a1118987136 _q(electronic bk.) |
||
020 | _z9781118987056 | ||
020 | _a1118987055 | ||
020 | _a9781118987056 | ||
029 | 1 |
_aDEBSZ _b445070870 |
|
029 | 1 |
_aGBVCP _b835784924 |
|
029 | 1 |
_aNZ1 _b16241486 |
|
029 | 1 |
_aDEBBG _bBV043397987 |
|
029 | 1 |
_aDEBBG _bBV043892433 |
|
029 | 1 |
_aDEBBG _bBV043968732 |
|
035 |
_a(OCoLC)918135837 _z(OCoLC)936042537 _z(OCoLC)957021819 _z(OCoLC)957184627 _z(OCoLC)957303245 _z(OCoLC)967626152 |
||
037 |
_aCL0500000707 _bSafari Books Online |
||
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aCOM _x043050 _2bisacsh |
|
072 | 7 |
_aCOM _x053000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 |
_aGregg, Michael _q(Michael C.), _eauthor. |
|
245 | 1 | 4 |
_aThe network security test lab : _ba step-by-step guide / _cMichael Gregg. |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c[2015] |
|
264 | 4 | _c©2015 | |
300 |
_a1 online resource : _bcolor illustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection. | |
588 | 0 | _aOnline resource; title from PDF title page (Ebsco, viewed Aug. 17, 2015). | |
500 | _aIncludes index. | ||
520 |
_aThis book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. -- _cEdited summary from book. |
||
650 | 0 |
_aComputer security _xEvaluation. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
650 | 7 |
_aCOMPUTERS /Networking / Security _2bisacsh |
|
650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
650 | 7 |
_aComputer networks _xSecurity measures. _2fast _0(OCoLC)fst00872341 |
|
650 | 7 |
_aComputer security _xEvaluation. _2fast _0(OCoLC)fst00872488 |
|
655 | 0 | _aElectronic books. | |
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aGregg, Michael. _tNetwork security test lab : a step-by-step guide. _dIndianapolis, Indiana : Wiley, c2015 _hxxiv, 455 pages _z9781118987056 |
856 | 4 | 0 |
_uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183433 _zWiley Online Library [Free Download only for SUST IP] |
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00621891 |
||
938 |
_aEBL - Ebook Library _bEBLB _nEBL4040350 |
||
938 |
_aEBSCOhost _bEBSC _n1051724 |
||
938 |
_aYBP Library Services _bYANK _n12573594 |
||
938 |
_aYBP Library Services _bYANK _n12580748 |
||
938 |
_aIngram Digital eBook Collection _bIDEB _ncis29819416 |
||
938 |
_aCoutts Information Services _bCOUT _n29819416 |
||
938 |
_aBooks 24x7 _bB247 _nbks00082556 |
||
938 |
_aYBP Library Services _bYANK _n13124345 |
||
994 |
_a92 _bDG1 |
||
999 |
_c65640 _d65640 |