|
|
|
|
LEADER |
02179nmm a2200349 u 4500 |
001 |
EB001926430 |
003 |
EBX01000000000000001089332 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0672328097
|
050 |
|
4 |
|a TK5105.59
|
100 |
1 |
|
|a Gregg, Michael
|
245 |
0 |
0 |
|a Inside network security assessment
|b guarding your IT infrastructure
|c Michael Gregg, David Kim
|
260 |
|
|
|a Indianapolis, Ind.
|b Sams
|c 2005
|
300 |
|
|
|a 312 pages
|
653 |
|
|
|a Sécurité informatique / Évaluation / Méthodologie
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast
|
653 |
|
|
|a Computer networks / Security measures / blmlsh
|
653 |
|
|
|a Computer security / Evaluation / Methodology
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Computer security / Evaluation / Methodology / blmlsh
|
700 |
1 |
|
|a Kim, David
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
776 |
|
|
|z 0672328097
|
776 |
|
|
|z 9780672328091
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/0672328097/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two highly qualified authors with close ties to the International Information Systems Security Certification Consortium, this book was developed with the goal of being a text for the CISSP continuing education class on Network Security Assessment. You will be provided with step-by-step training on assessing security, from paperwork to penetration testing to ethical hacking. The supporting website will also provide you with access to a variety of tools, checklists, and templates to make your job even easier. You'll save everyone time and money by learning to perform security assessments yourself with the help of Inside Network Security Assessment
|