Build your own security lab : (Record no. 934)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090617s2008 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008009610
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470179864 (paper/DVD)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u1856
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Gregg, Michael
Fuller form of name (Michael C.)
9 (RLIN) 2851
245 10 - TITLE STATEMENT
Title Build your own security lab :
Remainder of title a field guide for network testing /
Statement of responsibility, etc. Michael Gregg.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, IN :
Name of publisher, distributor, etc. Wiley,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxvi,428 p. :
Other physical details ill. ;
Dimensions 24 cm. +
Accompanying material 1 CD-ROM.
500 ## - GENERAL NOTE
General note Includes index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Hardware and Gear -- Building a Software Test Platform -- Passive Information Gathering -- Detecting Live Systems -- Enumerating Systems -- Automated Attack and Penetration Tools -- Understanding Cryptographic Systems -- Defeating Malware -- Securing Wireless Systems -- Intrusion Detection -- Forensic Detection -- Appendix A About the DVD -- Index.
520 ## - SUMMARY, ETC.
Summary, etc. Many books tell you what to do. This one tells you how.<p>If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.<p>Collect the necessary hardware and software and assemble your own network lab<p>Configure a bootable Linux CD<p>Explore various methods for gathering information about existing security<p>Identify automated attack and penetration tools<p>Understand cryptographic systems and encryption and authentication attacks<p>Learn to find, identify, and defeat malware<p>Address the special protection needs of wireless systems<p>Use Snort(R) to build an IDS that will help to detect and identify attacks in real time<p>DVD includes tools for actually building and implementing security solutions<p>Open source tools<p>Demo software<p>A bootable version of Linux
596 ## -
-- 1
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures
-- Testing.
9 (RLIN) 2852
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / GE.P 2008 001852 11/24/2019 1 11/24/2019 Books