LEADER 02974nam 2200613Ia 450 001 9910454507803321 005 20200520144314.0 010 $a1-281-31800-0 010 $a9786611318000 010 $a0-470-37947-2 010 $a0-470-37948-0 035 $a(CKB)1000000000691254 035 $a(EBL)362050 035 $a(OCoLC)437224673 035 $a(SSID)ssj0000290563 035 $a(PQKBManifestationID)11232730 035 $a(PQKBTitleCode)TC0000290563 035 $a(PQKBWorkID)10411296 035 $a(PQKB)11316483 035 $a(MiAaPQ)EBC362050 035 $a(CaSebORM)9780470179864 035 $a(Au-PeEL)EBL362050 035 $a(CaPaEBR)ebr10296643 035 $a(CaONFJC)MIL131800 035 $a(EXLCZ)991000000000691254 100 $a20080229d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aBuild your own security lab$b[electronic resource] $ea field guide for network testing /$fMichael Gregg 205 $a1st edition 210 $aIndianapolis, IN $cWiley$dc2008 215 $a1 online resource (458 p.) 300 $aIncludes index. 311 $a0-470-17986-4 327 $aBuild Your Own Security Lab: A Field Guide for Network Testing; About the Author; Credits; Contents at a Glance; Contents; Acknowledgments; Introduction; Chapter 1: Hardware and Gear; Chapter 2: Building a Software Test Platform; Chapter 3: Passive Information Gathering; Chapter 4: Detecting Live Systems; Chapter 5: Enumerating Systems; Chapter 6: Automated Attack and Penetration Tools; Chapter 7: Understanding Cryptographic Systems; Chapter 8: Defeating Malware; Chapter 9: Securing Wireless Systems; Chapter 10: Intrusion Detection; Chapter 11: Forensic Detection; Appendix A: About the DVD 327 $aIndex 330 $aIf your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file. 606 $aComputer networks$xSecurity measures$xTesting 606 $aWireless communication systems$xSecurity measures$xTesting 608 $aElectronic books. 615 0$aComputer networks$xSecurity measures$xTesting. 615 0$aWireless communication systems$xSecurity measures$xTesting. 676 $a005.8 700 $aGregg$b Michael$g(Michael C.)$0884346 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910454507803321 996 $aBuild your own security lab$91974791 997 $aUNINA LEADER 01251nam a22002771i 4500 001 991001930499707536 005 20040108135320.0 008 040407s1997 it |||||||||||||||||eng 035 $ab1284505x-39ule_inst 035 $aARCHE-082467$9ExL 040 $aDip.to Scienze Storiche$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a331.1250 100 1 $aPetit, Pascal$0127696 245 10$aTechnical change and employment growth in services: analytical and policy challenges /$cPascal Petit and Luc Soete 260 $aMilano :$bFondazione ENI Enrico Mattei,$c1997 300 $a1 v. ;$c21 cm 440 0$aNote di lavoro della Fondazione ENI Enrico Mattei ;$v46.97 650 4$aProgresso tecnico e occupazione 650 4$aSviluppo economico e progresso tecnico 700 1 $aSoete, Luc$eauthor$4http://id.loc.gov/vocabulary/relators/aut$089349 907 $a.b1284505x$b02-04-14$c16-04-04 912 $a991001930499707536 945 $aLE009 GEOG.COLL.14D/46$g1$i2009000309906$lle009$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i13399950$z16-04-04 996 $aTechnical change and employment growth in services: analytical and policy challenges$91448286 997 $aUNISALENTO 998 $ale009$b16-04-04$cm$da $e-$feng$git $h0$i1