000 | 02008nam a2200229Ia 4500 | ||
---|---|---|---|
003 | NULRC | ||
005 | 20250520102910.0 | ||
008 | 250520s9999 xx 000 0 und d | ||
020 | _a9781118987056 | ||
040 | _cNULRC | ||
050 | _aQA 76.9.A25 .G74 2015 | ||
100 |
_aGregg, Michael _eauthor |
||
245 | 4 |
_aThe network security test lab: _ba step-by-step guide / _cMichael Gregg |
|
260 |
_aIndianapolis, Indiana : _bWiley, _cc2015 |
||
300 |
_axxiv, 455 pages : _billustrations ; _c24 cm. |
||
365 | _bUSD18.35 | ||
504 | _aIncludes index. | ||
505 | _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection. | ||
520 | _aThis book sets you up for success defending your company's network against a full complement of today's most-damaging malware, viruses, and other attack technologies. Written to be a practitioner's tool, it will show you how to dissect network packets and gives you reliable strategies for defending against a variety of threats--including network attacks, crimeware, malware, and the most-prevalent malicious traffic--and trains you on the software used by the top experts in the field to implement your unique plan, including Wireshark, Networkminer, Nmap, Metasploit, and more. Step-by-step instruction begins with explaining how to accurately assess your network's security and establish processes to test penetration. Keep your security strong by setting up your own security-testing lab inside where you can simulate attacks in isolation to observe how systems are targeted and to customize better defenses to stop them. -- Edited summary from book. | ||
650 | _aCOMPUTER NETWORKS -- SECURITY MEASURES | ||
942 |
_2lcc _cBK |
||
999 |
_c18225 _d18225 |