000 05726cam a2200913 i 4500
001 ocn918135837
003 OCoLC
005 20240523125538.0
006 m o d
007 cr cnu|||unuuu
008 150813t20152015inua o 001 0 eng d
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dYDXCP
_dIDEBK
_dDG1
_dCDX
_dCOO
_dDEBSZ
_dOCLCF
_dOCLCQ
_dSTF
_dB24X7
_dUMI
_dEBLCP
_dYDX
_dDEBBG
_dRECBK
_dCCO
_dVT2
_dLOA
_dDG1
_dK6U
_dZ5A
_dLIP
_dPIFAG
_dFVL
_dZCU
_dLIV
_dOCLCQ
_dMERUC
_dOCLCQ
_dU3W
_dOCLCA
_dCOCUF
_dREB
_dD6H
_dOCLCQ
_dWRM
_dCEF
_dCRU
_dICG
_dVTS
_dOCLCQ
_dWYU
_dG3B
_dTKN
_dOCLCQ
_dUAB
_dDKC
_dOCLCQ
_dUKAHL
_dOCLCQ
_dBRF
_dOCLCO
_dOCLCQ
_dOCLCO
_dOCLCL
019 _a936042537
_a957021819
_a957184627
_a957303245
_a967626152
_a1008952717
_a1026466560
_a1055350525
_a1066465822
_a1081200110
_a1103272500
_a1129374118
_a1152976328
_a1192348750
_a1228569080
_a1240538405
020 _a9781119183433
_q(electronic bk.)
020 _a111918343X
_q(electronic bk.)
020 _a9781118987155
_q(electronic bk.)
020 _a1118987152
_q(electronic bk.)
020 _a9781118987131
_q(electronic bk.)
020 _a1118987136
_q(electronic bk.)
020 _a1118987055
020 _a9781118987056
020 _z9781118987056
029 1 _aAU@
_b000056113757
029 1 _aAU@
_b000060217563
029 1 _aCHNEW
_b000944607
029 1 _aCHVBK
_b480248435
029 1 _aDEBBG
_bBV043397987
029 1 _aDEBBG
_bBV043892433
029 1 _aDEBBG
_bBV043968732
029 1 _aDEBSZ
_b445070870
029 1 _aDEBSZ
_b468874763
029 1 _aDEBSZ
_b485792427
029 1 _aGBVCP
_b835784924
029 1 _aGBVCP
_b88275176X
029 1 _aNZ1
_b16241486
035 _a(OCoLC)918135837
_z(OCoLC)936042537
_z(OCoLC)957021819
_z(OCoLC)957184627
_z(OCoLC)957303245
_z(OCoLC)967626152
_z(OCoLC)1008952717
_z(OCoLC)1026466560
_z(OCoLC)1055350525
_z(OCoLC)1066465822
_z(OCoLC)1081200110
_z(OCoLC)1103272500
_z(OCoLC)1129374118
_z(OCoLC)1152976328
_z(OCoLC)1192348750
_z(OCoLC)1228569080
_z(OCoLC)1240538405
037 _aCL0500000707
_bSafari Books Online
050 4 _aQA76.9.A25
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aGregg, Michael
_q(Michael C.),
_eauthor.
_1https://id.oclc.org/worldcat/entity/E39PBJwMxyRv8xrQGt4d7JmKh3
245 1 4 _aThe network security test lab :
_ba step-by-step guide /
_cMichael Gregg.
264 1 _aIndianapolis, IN :
_bWiley,
_c[2015]
264 4 _c�2015
300 _a1 online resource :
_bcolor illustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
588 0 _aOnline resource; title from PDF title page (Ebsco, viewed August 17, 2015).
500 _aIncludes index.
520 _aThis book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. --
_cEdited summary from book.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security
_xEvaluation.
650 0 _aComputer networks
_xSecurity measures.
650 6 _aS�ecurit�e informatique
_x�Evaluation.
650 6 _aR�eseaux d'ordinateurs
_xS�ecurit�e
_xMesures.
650 7 _aCOMPUTERS /Networking
_xSecurity.
_2bisacsh
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer networks
_xSecurity measures
_2fast
650 7 _aComputer security
_xEvaluation
_2fast
758 _ihas work:
_aThe network security test lab (Text)
_1https://id.oclc.org/worldcat/entity/E39PCGTRyvCxKHv6WDMC4Yt6gC
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aGregg, Michael.
_tNetwork security test lab : a step-by-step guide.
_dIndianapolis, Indiana : Wiley, �2015
_hxxiv, 455 pages
_z9781118987056
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119183433
938 _aAskews and Holts Library Services
_bASKH
_nAH27098840
938 _aAskews and Holts Library Services
_bASKH
_nAH27098787
938 _aBooks 24x7
_bB247
_nbks00082556
938 _aCoutts Information Services
_bCOUT
_n29819416
938 _aEBL - Ebook Library
_bEBLB
_nEBL4040350
938 _aEBSCOhost
_bEBSC
_n1051724
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis29819416
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00621891
938 _aYBP Library Services
_bYANK
_n12580748
938 _aYBP Library Services
_bYANK
_n12573594
938 _aYBP Library Services
_bYANK
_n13124345
994 _a92
_bINLUM
999 _c12258
_d12258