000 01894cam a22003977i 4500
001 18705835
003 AUCL
005 20200729113401.0
008 150717t20152015inua 001 0 eng d
010 _a 2015946971
020 _a9781118987056
020 _a1118987055
035 _a(OCoLC)ocn891126187
040 _aBTCTA
_beng
_cBTCTA
_erda
_dBDX
_dYDXCP
_dOCLCO
_dCDX
_dPX0
_dOCLCF
_dIAD
_dDLC
042 _alccopycat
050 0 0 _aTK5105.59
_b.G734 2015
082 0 4 _a005.8
_223
_bGRE
100 1 _aGregg, Michael
_q(Michael C.),
_eauthor.
245 1 4 _aThe network security test lab
_ba step-by-step guide
_cMichael Gregg.
264 1 _aIndianapolis, IN :
_bWiley,
_c[2015]
264 4 _c©2015
300 _axxiv, 455 pages :
_billustrations ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _aIncludes index.
505 0 _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection.
650 0 _aComputer security
_xEvaluation.
650 0 _aComputer networks
_xSecurity measures.
856 4 2 _3Contributor biographical information
_uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-b.html
856 4 2 _3Publisher description
_uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-d.html
856 4 1 _3Table of contents only
_uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-t.html
906 _a7
_bcbc
_ccopycat
_d2
_eepcn
_f20
_gy-gencatlg
942 _2ddc
_cBK
999 _c25427
_d25427