000 | 01894cam a22003977i 4500 | ||
---|---|---|---|
001 | 18705835 | ||
003 | AUCL | ||
005 | 20200729113401.0 | ||
008 | 150717t20152015inua 001 0 eng d | ||
010 | _a 2015946971 | ||
020 | _a9781118987056 | ||
020 | _a1118987055 | ||
035 | _a(OCoLC)ocn891126187 | ||
040 |
_aBTCTA _beng _cBTCTA _erda _dBDX _dYDXCP _dOCLCO _dCDX _dPX0 _dOCLCF _dIAD _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aTK5105.59 _b.G734 2015 |
082 | 0 | 4 |
_a005.8 _223 _bGRE |
100 | 1 |
_aGregg, Michael _q(Michael C.), _eauthor. |
|
245 | 1 | 4 |
_aThe network security test lab _ba step-by-step guide _cMichael Gregg. |
264 | 1 |
_aIndianapolis, IN : _bWiley, _c[2015] |
|
264 | 4 | _c©2015 | |
300 |
_axxiv, 455 pages : _billustrations ; _c24 cm |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
500 | _aIncludes index. | ||
505 | 0 | _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection. | |
650 | 0 |
_aComputer security _xEvaluation. |
|
650 | 0 |
_aComputer networks _xSecurity measures. |
|
856 | 4 | 2 |
_3Contributor biographical information _uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-b.html |
856 | 4 | 2 |
_3Publisher description _uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-d.html |
856 | 4 | 1 |
_3Table of contents only _uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-t.html |
906 |
_a7 _bcbc _ccopycat _d2 _eepcn _f20 _gy-gencatlg |
||
942 |
_2ddc _cBK |
||
999 |
_c25427 _d25427 |