Build your own security lab a field guide for network testing

"If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment,...

Full description

Bibliographic Details
Main Author: Gregg, Michael
Format: eBook
Language:English
Published: Indianapolis, IN Wiley 2008
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02421nmm a2200493 u 4500
001 EB001912428
003 EBX01000000000000001075330
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9786611318000 
020 |a 9781281318008 
020 |a 0470379480 
020 |a 9780470379479 
020 |a 1281318000 
020 |a 6611318003 
020 |a 0470379472 
050 4 |a TK5105.59 
100 1 |a Gregg, Michael 
245 0 0 |a Build your own security lab  |b a field guide for network testing  |c Michael Gregg 
260 |a Indianapolis, IN  |b Wiley  |c 2008 
300 |a xxvi, 428 pages  |b illustrations 
505 0 |a 1. Hardware and Gear -- 2. Building a Software Test Platform -- 3. Passive Information Gathering -- 4. Detecting Live Systems -- 5. Enumerating Systems -- 6. Automated Attack and Penetration Tools -- 7. Understanding Cryptographic Systems -- 8. Defeating Malware -- 9. Securing Wireless Systems -- 10. Intrusion Detection -- 11. Forensic Detection 
653 |a COMPUTERS / Internet / Security / bisacsh 
653 |a Wireless communication systems / Security measures / Testing 
653 |a COMPUTERS / Networking / Security / bisacsh 
653 |a Computer Communication Networks 
653 |a Réseaux d'ordinateurs 
653 |a Computer networks / Security measures / Testing 
653 |a Computer networks / fast 
653 |a Computer networks / http://id.loc.gov/authorities/subjects/sh85029513 
653 |a COMPUTERS / Security / General / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
015 |a GBA790682 
776 |z 0470179864 
776 |z 9780470379479 
776 |z 0470379472 
776 |z 9780470179864 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780470179864/?ar  |x Verlag  |3 Volltext 
082 0 |a 384 
082 0 |a 331 
082 0 |a 005.8 22 
520 |a "If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future."--Resource description page