| 000 | 01519cam a22003017i 4500 | ||
|---|---|---|---|
| 005 | 20260115013827.0 | ||
| 008 | 150717t2015 inua g 001 0 eng d | ||
| 020 | _a1118987055 | ||
| 020 | _a9781118987056 | ||
| 040 |
_aMPL _cMPL _erda |
||
| 041 | 0 | _aara | |
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aGregg, Michael _q(Michael C.) _eauthor |
|
| 245 | 1 | 4 |
_aThe network security test lab _ba step-by-step guide _cMichael Gregg |
| 264 | 1 |
_aIndianapolis, IN _bWiley _c2015 |
|
| 264 | 4 | _c2015 | |
| 300 |
_axxiv, 455 pages _billustrations _c24 سم |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 500 | _aIncludes index | ||
| 505 | 0 | _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection | |
| 650 | 0 |
_aComputer networks _xSecurity measures |
|
| 650 | 0 |
_aComputer security _xEvaluation |
|
| 856 | 4 | 1 |
_3Table of contents only _uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-t.html |
| 856 | 4 | 2 |
_3Contributor biographical information _uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-b.html |
| 856 | 4 | 2 |
_3Publisher description _uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-d.html |
| 999 |
_c46313 _d46313 |
||