Build your own security lab : (Record no. 934)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 090617s2008 njua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2008009610 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9780470179864 (paper/DVD) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u1856 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Gregg, Michael |
| Fuller form of name | (Michael C.) |
| 9 (RLIN) | 2851 |
| 245 10 - TITLE STATEMENT | |
| Title | Build your own security lab : |
| Remainder of title | a field guide for network testing / |
| Statement of responsibility, etc. | Michael Gregg. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Indianapolis, IN : |
| Name of publisher, distributor, etc. | Wiley, |
| Date of publication, distribution, etc. | c2008. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xxvi,428 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. + |
| Accompanying material | 1 CD-ROM. |
| 500 ## - GENERAL NOTE | |
| General note | Includes index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Hardware and Gear -- Building a Software Test Platform -- Passive Information Gathering -- Detecting Live Systems -- Enumerating Systems -- Automated Attack and Penetration Tools -- Understanding Cryptographic Systems -- Defeating Malware -- Securing Wireless Systems -- Intrusion Detection -- Forensic Detection -- Appendix A About the DVD -- Index. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Many books tell you what to do. This one tells you how.<p>If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.<p>Collect the necessary hardware and software and assemble your own network lab<p>Configure a bootable Linux CD<p>Explore various methods for gathering information about existing security<p>Identify automated attack and penetration tools<p>Understand cryptographic systems and encryption and authentication attacks<p>Learn to find, identify, and defeat malware<p>Address the special protection needs of wireless systems<p>Use Snort(R) to build an IDS that will help to detect and identify attacks in real time<p>DVD includes tools for actually building and implementing security solutions<p>Open source tools<p>Demo software<p>A bootable version of Linux |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures |
| -- | Testing. |
| 9 (RLIN) | 2852 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ACA-P | 005.8 / GE.P 2008 | 001852 | 11/24/2019 | 1 | 11/24/2019 | Books |