|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn918135837 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
150813t20152015inua o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d YDXCP
|d IDEBK
|d DG1
|d CDX
|d COO
|d DEBSZ
|d OCLCF
|d OCLCQ
|d STF
|d B24X7
|d UMI
|d EBLCP
|d YDX
|d DEBBG
|d RECBK
|d CCO
|d VT2
|d LOA
|d DG1
|d K6U
|d Z5A
|d LIP
|d PIFAG
|d FVL
|d ZCU
|d LIV
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d COCUF
|d REB
|d D6H
|d OCLCQ
|d WRM
|d CEF
|d CRU
|d ICG
|d VTS
|d OCLCQ
|d WYU
|d G3B
|d TKN
|d OCLCQ
|d UAB
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 936042537
|a 957021819
|a 957184627
|a 957303245
|a 967626152
|a 1008952717
|a 1026466560
|a 1055350525
|a 1066465822
|a 1081200110
|a 1103272500
|a 1129374118
|a 1152976328
|a 1192348750
|a 1228569080
|a 1240538405
|
020 |
|
|
|a 9781119183433
|q (electronic bk.)
|
020 |
|
|
|a 111918343X
|q (electronic bk.)
|
020 |
|
|
|a 9781118987155
|q (electronic bk.)
|
020 |
|
|
|a 1118987152
|q (electronic bk.)
|
020 |
|
|
|a 9781118987131
|q (electronic bk.)
|
020 |
|
|
|a 1118987136
|q (electronic bk.)
|
020 |
|
|
|a 1118987055
|
020 |
|
|
|a 9781118987056
|
020 |
|
|
|z 9781118987056
|
029 |
1 |
|
|a AU@
|b 000056113757
|
029 |
1 |
|
|a AU@
|b 000060217563
|
029 |
1 |
|
|a CHNEW
|b 000944607
|
029 |
1 |
|
|a CHVBK
|b 480248435
|
029 |
1 |
|
|a DEBBG
|b BV043397987
|
029 |
1 |
|
|a DEBBG
|b BV043892433
|
029 |
1 |
|
|a DEBBG
|b BV043968732
|
029 |
1 |
|
|a DEBSZ
|b 445070870
|
029 |
1 |
|
|a DEBSZ
|b 468874763
|
029 |
1 |
|
|a DEBSZ
|b 485792427
|
029 |
1 |
|
|a DKDLA
|b 820120-katalog:999932878105765
|
029 |
1 |
|
|a GBVCP
|b 835784924
|
029 |
1 |
|
|a GBVCP
|b 88275176X
|
029 |
1 |
|
|a NZ1
|b 16241486
|
035 |
|
|
|a (OCoLC)918135837
|z (OCoLC)936042537
|z (OCoLC)957021819
|z (OCoLC)957184627
|z (OCoLC)957303245
|z (OCoLC)967626152
|z (OCoLC)1008952717
|z (OCoLC)1026466560
|z (OCoLC)1055350525
|z (OCoLC)1066465822
|z (OCoLC)1081200110
|z (OCoLC)1103272500
|z (OCoLC)1129374118
|z (OCoLC)1152976328
|z (OCoLC)1192348750
|z (OCoLC)1228569080
|z (OCoLC)1240538405
|
037 |
|
|
|a CL0500000707
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gregg, Michael
|q (Michael C.),
|e author.
|
245 |
1 |
4 |
|a The network security test lab :
|b a step-by-step guide /
|c Michael Gregg.
|
264 |
|
1 |
|a Indianapolis, IN :
|b Wiley,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource :
|b color illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Building a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
|
588 |
0 |
|
|a Online resource; title from PDF title page (Ebsco, viewed August 17, 2015).
|
500 |
|
|
|a Includes index.
|
520 |
|
|
|a This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. --
|c Edited summary from book.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security
|x Evaluation.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique
|x Évaluation.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS /Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|x Evaluation
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Gregg, Michael.
|t Network security test lab : a step-by-step guide.
|d Indianapolis, Indiana : Wiley, ©2015
|h xxiv, 455 pages
|z 9781118987056
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781118987056/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH27098840
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH27098787
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00082556
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 29819416
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4040350
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1051724
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis29819416
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00621891
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12580748
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12573594
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13124345
|
994 |
|
|
|a 92
|b IZTAP
|