The network security test lab: (Record no. 18225)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02008nam a2200229Ia 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | NULRC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250520102910.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250520s9999 xx 000 0 und d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118987056 |
040 ## - CATALOGING SOURCE | |
Transcribing agency | NULRC |
050 ## - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA 76.9.A25 .G74 2015 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | Gregg, Michael |
Relator term | author |
245 #4 - TITLE STATEMENT | |
Title | The network security test lab: |
Remainder of title | a step-by-step guide / |
Statement of responsibility, etc. | Michael Gregg |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Indianapolis, Indiana : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | c2015 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxiv, 455 pages : |
Other physical details | illustrations ; |
Dimensions | 24 cm. |
365 ## - TRADE PRICE | |
Price amount | USD18.35 |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Building a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. -- Edited summary from book. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTER NETWORKS -- SECURITY MEASURES |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | Books |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Collection | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Cost, normal purchase price | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Library of Congress Classification | Mobile and Web Applications | LRC - Main | National University - Manila | General Circulation | 09/04/2018 | Purchased - Amazon | 18.35 | GC QA 76.9.A25 .G74 2015 | NULIB000015984 | 05/20/2025 | c.1 | 05/20/2025 | Books |