000 04486cam a2200793Ii 4500
001 ocn918135837
003 OCoLC
005 20171224114944.0
006 m o d
007 cr cnu|||unuuu
008 150813t20152015inua o 001 0 eng d
010 _a 2015946971
040 _aN$T
_beng
_erda
_epn
_cN$T
_dN$T
_dYDXCP
_dIDEBK
_dDG1
_dCDX
_dCOO
_dDEBSZ
_dOCLCF
_dOCLCQ
_dSTF
_dB24X7
_dUMI
_dEBLCP
_dYDX
_dDEBBG
_dRECBK
_dCCO
_dVT2
019 _a936042537
_a957021819
_a957184627
_a957303245
_a967626152
020 _a9781119183433
_qelectronic bk.
020 _a111918343X
_qelectronic bk.
020 _a9781118987155
_q(electronic bk.)
020 _a1118987152
_q(electronic bk.)
020 _a9781118987131
_q(electronic bk.)
020 _a1118987136
_q(electronic bk.)
020 _z9781118987056
020 _a1118987055
020 _a9781118987056
029 1 _aDEBSZ
_b445070870
029 1 _aGBVCP
_b835784924
029 1 _aNZ1
_b16241486
029 1 _aDEBBG
_bBV043397987
029 1 _aDEBBG
_bBV043892433
029 1 _aDEBBG
_bBV043968732
035 _a(OCoLC)918135837
_z(OCoLC)936042537
_z(OCoLC)957021819
_z(OCoLC)957184627
_z(OCoLC)957303245
_z(OCoLC)967626152
037 _aCL0500000707
_bSafari Books Online
050 4 _aQA76.9.A25
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aGregg, Michael
_q(Michael C.),
_eauthor.
245 1 4 _aThe network security test lab :
_ba step-by-step guide /
_cMichael Gregg.
264 1 _aIndianapolis, IN :
_bWiley,
_c[2015]
264 4 _c©2015
300 _a1 online resource :
_bcolor illustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
588 0 _aOnline resource; title from PDF title page (Ebsco, viewed Aug. 17, 2015).
500 _aIncludes index.
520 _aThis book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. --
_cEdited summary from book.
650 0 _aComputer security
_xEvaluation.
650 0 _aComputer networks
_xSecurity measures.
650 7 _aCOMPUTERS /Networking / Security
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
650 7 _aComputer networks
_xSecurity measures.
_2fast
_0(OCoLC)fst00872341
650 7 _aComputer security
_xEvaluation.
_2fast
_0(OCoLC)fst00872488
655 0 _aElectronic books.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aGregg, Michael.
_tNetwork security test lab : a step-by-step guide.
_dIndianapolis, Indiana : Wiley, c2015
_hxxiv, 455 pages
_z9781118987056
856 4 0 _uhttp://onlinelibrary.wiley.com/book/10.1002/9781119183433
_zWiley Online Library
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00621891
938 _aEBL - Ebook Library
_bEBLB
_nEBL4040350
938 _aEBSCOhost
_bEBSC
_n1051724
938 _aYBP Library Services
_bYANK
_n12573594
938 _aYBP Library Services
_bYANK
_n12580748
938 _aIngram Digital eBook Collection
_bIDEB
_ncis29819416
938 _aCoutts Information Services
_bCOUT
_n29819416
938 _aBooks 24x7
_bB247
_nbks00082556
938 _aYBP Library Services
_bYANK
_n13124345
994 _a92
_bDG1
999 _c14159
_d14159