|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn953858915 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160318s2016 mau ob 000 0 eng d |
040 |
|
|
|a NLE
|b eng
|e rda
|e pn
|c NLE
|d OCLCO
|d OCLCF
|d GGVRL
|d OCLCQ
|d UMI
|d TOH
|d COO
|d STF
|d DEBBG
|d JG0
|d DEBSZ
|d REB
|d CEF
|d KSU
|d OCLCQ
|d WYU
|d NZTOI
|d UKMGB
|d VLB
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB649858
|2 bnb
|
016 |
7 |
|
|a 017798431
|2 Uk
|
019 |
|
|
|a 956735851
|a 961332324
|a 966372882
|a 1112099289
|
020 |
|
|
|a 9780128036013
|q (PDF ebook)
|
020 |
|
|
|a 012803601X
|q (PDF ebook)
|
020 |
|
|
|a 0128035846
|
020 |
|
|
|a 9780128035849
|
020 |
|
|
|z 9780128035849
|q (pbk.)
|
029 |
1 |
|
|a CHBIS
|b 010796360
|
029 |
1 |
|
|a CHVBK
|b 403938171
|
029 |
1 |
|
|a DEBBG
|b BV043969883
|
029 |
1 |
|
|a DEBSZ
|b 485804123
|
029 |
1 |
|
|a GBVCP
|b 882758489
|
029 |
1 |
|
|a UKMGB
|b 017798431
|
035 |
|
|
|a (OCoLC)953858915
|z (OCoLC)956735851
|z (OCoLC)961332324
|z (OCoLC)966372882
|z (OCoLC)1112099289
|
037 |
|
|
|a 9780128036013
|b Ingram Content Group
|
050 |
|
4 |
|a TK5105.59
|b .C43 2016
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Chapman, Chris,
|e author.
|
245 |
1 |
0 |
|a Network performance and security :
|b testing and analyzing using open source and low-cost tools /
|c Chris Chapman.
|
264 |
|
1 |
|a Rockland :
|b Syngress,
|c 2016.
|
264 |
|
4 |
|c ©2016
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
505 |
0 |
|
|a Introduction: Practical Security and Performance Testing Ch. 1: Getting organized: Asset Inventory; knowing what you have Ch. 2: Locking down Access: Internet, Wi-Fi, Wired Zones, and VPN Ch. 3: Securing BYOD device access Ch. 4: Hardening the Server Ch. 5: Internal Security Threats and defending assets and zones Ch. 6: How to test the Firewall and IPS/IDS Effectively Ch. 7: Security Device Deployment Patterns Ch. 8: Continuous Testing Ch. 9: Defending against penetration attacks Ch. 10: How to write and test a Request for Proposal Ch. 11: Security "Fire drills" Glossary.
|
588 |
0 |
|
|a CIP data; item not viewed.
|
520 |
|
|
|a This resource offers software engineers practical tips and tricks needed to strengthen IT infrastructure using low cost open source tools.
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
0 |
|a Network performance (Telecommunication)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
6 |
|a Performance des réseaux (Télécommunications)
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Network performance (Telecommunication)
|2 fast
|
776 |
0 |
8 |
|i Print version :
|z 9780128035849
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128036013/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a Gale Cengage Learning
|b GVRL
|n GVRL9JUB
|
994 |
|
|
|a 92
|b IZTAP
|