|
|
|
|
LEADER |
02421nmm a2200493 u 4500 |
001 |
EB001912428 |
003 |
EBX01000000000000001075330 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 9786611318000
|
020 |
|
|
|a 9781281318008
|
020 |
|
|
|a 0470379480
|
020 |
|
|
|a 9780470379479
|
020 |
|
|
|a 1281318000
|
020 |
|
|
|a 6611318003
|
020 |
|
|
|a 0470379472
|
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Gregg, Michael
|
245 |
0 |
0 |
|a Build your own security lab
|b a field guide for network testing
|c Michael Gregg
|
260 |
|
|
|a Indianapolis, IN
|b Wiley
|c 2008
|
300 |
|
|
|a xxvi, 428 pages
|b illustrations
|
505 |
0 |
|
|a 1. Hardware and Gear -- 2. Building a Software Test Platform -- 3. Passive Information Gathering -- 4. Detecting Live Systems -- 5. Enumerating Systems -- 6. Automated Attack and Penetration Tools -- 7. Understanding Cryptographic Systems -- 8. Defeating Malware -- 9. Securing Wireless Systems -- 10. Intrusion Detection -- 11. Forensic Detection
|
653 |
|
|
|a COMPUTERS / Internet / Security / bisacsh
|
653 |
|
|
|a Wireless communication systems / Security measures / Testing
|
653 |
|
|
|a COMPUTERS / Networking / Security / bisacsh
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Réseaux d'ordinateurs
|
653 |
|
|
|a Computer networks / Security measures / Testing
|
653 |
|
|
|a Computer networks / fast
|
653 |
|
|
|a Computer networks / http://id.loc.gov/authorities/subjects/sh85029513
|
653 |
|
|
|a COMPUTERS / Security / General / bisacsh
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
015 |
|
|
|a GBA790682
|
776 |
|
|
|z 0470179864
|
776 |
|
|
|z 9780470379479
|
776 |
|
|
|z 0470379472
|
776 |
|
|
|z 9780470179864
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780470179864/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 384
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8 22
|
520 |
|
|
|a "If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future."--Resource description page
|