The network security test lab : a step-by-step guide /
This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Indianapolis, IN :
Wiley,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn918135837 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 150813t20152015inua o 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d N$T |d YDXCP |d IDEBK |d DG1 |d CDX |d COO |d DEBSZ |d OCLCF |d OCLCQ |d STF |d B24X7 |d UMI |d EBLCP |d YDX |d DEBBG |d RECBK |d CCO |d VT2 |d LOA |d DG1 |d K6U |d Z5A |d LIP |d PIFAG |d FVL |d ZCU |d LIV |d OCLCQ |d MERUC |d OCLCQ |d U3W |d OCLCA |d COCUF |d REB |d D6H |d OCLCQ |d WRM |d CEF |d CRU |d ICG |d VTS |d OCLCQ |d WYU |d G3B |d TKN |d OCLCQ |d UAB |d DKC |d OCLCQ |d UKAHL |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 936042537 |a 957021819 |a 957184627 |a 957303245 |a 967626152 |a 1008952717 |a 1026466560 |a 1055350525 |a 1066465822 |a 1081200110 |a 1103272500 |a 1129374118 |a 1152976328 |a 1192348750 |a 1228569080 |a 1240538405 | ||
020 | |a 9781119183433 |q (electronic bk.) | ||
020 | |a 111918343X |q (electronic bk.) | ||
020 | |a 9781118987155 |q (electronic bk.) | ||
020 | |a 1118987152 |q (electronic bk.) | ||
020 | |a 9781118987131 |q (electronic bk.) | ||
020 | |a 1118987136 |q (electronic bk.) | ||
020 | |a 1118987055 | ||
020 | |a 9781118987056 | ||
020 | |z 9781118987056 | ||
029 | 1 | |a AU@ |b 000056113757 | |
029 | 1 | |a AU@ |b 000060217563 | |
029 | 1 | |a CHNEW |b 000944607 | |
029 | 1 | |a CHVBK |b 480248435 | |
029 | 1 | |a DEBBG |b BV043397987 | |
029 | 1 | |a DEBBG |b BV043892433 | |
029 | 1 | |a DEBBG |b BV043968732 | |
029 | 1 | |a DEBSZ |b 445070870 | |
029 | 1 | |a DEBSZ |b 468874763 | |
029 | 1 | |a DEBSZ |b 485792427 | |
029 | 1 | |a GBVCP |b 835784924 | |
029 | 1 | |a GBVCP |b 88275176X | |
029 | 1 | |a NZ1 |b 16241486 | |
035 | |a (OCoLC)918135837 |z (OCoLC)936042537 |z (OCoLC)957021819 |z (OCoLC)957184627 |z (OCoLC)957303245 |z (OCoLC)967626152 |z (OCoLC)1008952717 |z (OCoLC)1026466560 |z (OCoLC)1055350525 |z (OCoLC)1066465822 |z (OCoLC)1081200110 |z (OCoLC)1103272500 |z (OCoLC)1129374118 |z (OCoLC)1152976328 |z (OCoLC)1192348750 |z (OCoLC)1228569080 |z (OCoLC)1240538405 | ||
037 | |a CL0500000707 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Gregg, Michael |q (Michael C.), |e author. |1 https://id.oclc.org/worldcat/entity/E39PBJwMxyRv8xrQGt4d7JmKh3 | |
245 | 1 | 4 | |a The network security test lab : |b a step-by-step guide / |c Michael Gregg. |
264 | 1 | |a Indianapolis, IN : |b Wiley, |c [2015] | |
264 | 4 | |c ©2015 | |
300 | |a 1 online resource : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Building a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection. | |
588 | 0 | |a Online resource; title from PDF title page (Ebsco, viewed August 17, 2015). | |
500 | |a Includes index. | ||
520 | |a This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. -- |c Edited summary from book. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security |x Evaluation. | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a Sécurité informatique |x Évaluation. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS /Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Evaluation |2 fast | |
758 | |i has work: |a The network security test lab (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGTRyvCxKHv6WDMC4Yt6gC |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Gregg, Michael. |t Network security test lab : a step-by-step guide. |d Indianapolis, Indiana : Wiley, ©2015 |h xxiv, 455 pages |z 9781118987056 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781118987056/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=4040350 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH27098840 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH27098787 | ||
938 | |a Books 24x7 |b B247 |n bks00082556 | ||
938 | |a Coutts Information Services |b COUT |n 29819416 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL4040350 | ||
938 | |a EBSCOhost |b EBSC |n 1051724 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis29819416 | ||
938 | |a Recorded Books, LLC |b RECE |n rbeEB00621891 | ||
938 | |a YBP Library Services |b YANK |n 12580748 | ||
938 | |a YBP Library Services |b YANK |n 12573594 | ||
938 | |a YBP Library Services |b YANK |n 13124345 | ||
994 | |a 92 |b IZTAP |