000 01519cam a22003017i 4500
005 20260115013827.0
008 150717t2015 inua g 001 0 eng d
020 _a1118987055
020 _a9781118987056
040 _aMPL
_cMPL
_erda
041 0 _aara
082 0 4 _a005.8
_223
100 1 _aGregg, Michael
_q(Michael C.)
_eauthor
245 1 4 _aThe network security test lab
_ba step-by-step guide
_cMichael Gregg
264 1 _aIndianapolis, IN
_bWiley
_c2015
264 4 _c2015
300 _axxiv, 455 pages
_billustrations
_c24 سم
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
500 _aIncludes index
505 0 _aBuilding a Hardware and Software Test Platform -- Passive Information Gathering -- Analyzing Network Traffic -- Detecting Live Systems and Analyzing Results -- Enumerating Systems -- Automating Encryption and Tunneling Techniques -- Automated Attack and Penetration Tools -- Securing Wireless Systems -- An Introduction to Malware -- Detecting Intrusions and Analyzing Malware -- Forensic Detection
650 0 _aComputer networks
_xSecurity measures
650 0 _aComputer security
_xEvaluation
856 4 1 _3Table of contents only
_uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-t.html
856 4 2 _3Contributor biographical information
_uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-b.html
856 4 2 _3Publisher description
_uhttps://www.loc.gov/catdir/enhancements/fy1702/2015946971-d.html
999 _c46313
_d46313