The network security test lab: a step-by-step guide / Michael Gregg
Material type:
- 9781118987056
- QA 76.9.A25 .G74 2015

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Main General Circulation | Mobile and Web Applications | GC QA 76.9.A25 .G74 2015 (Browse shelf(Opens below)) | c.1 | Available | NULIB000015984 |
Browsing LRC - Main shelves, Shelving location: General Circulation, Collection: Mobile and Web Applications Close shelf browser (Hides shelf browser)
No cover image available |
![]() |
![]() |
![]() |
No cover image available |
![]() |
![]() |
||
GC QA 76.8 .M38 1990 PageMaker 4 for the Macintosh made easy / | GC QA 76.8 .W43 1991 PageMaker 4 for the PC / | GC QA 76.9 .A53 2014 The basics of information security : understanding the fundamentals of InfoSec in theory and practice / | GC QA 76.9.A25 .G74 2015 The network security test lab: a step-by-step guide / | GC QA 76.9.V5 .K35 1993 c.1 The science of virtual reality and virtual environments : a technical, scientific and engineering reference on virtual environments / | GC QA 76.28 .J47 2017 c.1 CompTIA IT fundamentals exam guide (exam FC0-U51) / | GC QA 76.28 .J47 2017 c.2 CompTIA IT fundamentals exam guide (exam FC0-U51) / |
Includes index.
Building a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
This book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. -- Edited summary from book.
There are no comments on this title.