| 000 | 02605cam a2200265 a 4500 | ||
|---|---|---|---|
| 008 | 090617s2008 njua b 001 0 eng | ||
| 010 | _a2008009610 | ||
| 020 | _a9780470179864 (paper/DVD) | ||
| 035 | _a(Sirsi) u1856 | ||
| 040 |
_aEG-CaNU _cEG-CaNU _dEG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 4 |
_a005.8 _2 22 |
| 100 | 1 |
_aGregg, Michael _q (Michael C.) _92851 |
|
| 245 | 1 | 0 |
_aBuild your own security lab : _b a field guide for network testing / _c Michael Gregg. |
| 260 |
_aIndianapolis, IN : _b Wiley, _c c2008. |
||
| 300 |
_axxvi,428 p. : _b ill. ; _c 24 cm. + _e 1 CD-ROM. |
||
| 500 | _aIncludes index. | ||
| 505 | 0 | _aHardware and Gear -- Building a Software Test Platform -- Passive Information Gathering -- Detecting Live Systems -- Enumerating Systems -- Automated Attack and Penetration Tools -- Understanding Cryptographic Systems -- Defeating Malware -- Securing Wireless Systems -- Intrusion Detection -- Forensic Detection -- Appendix A About the DVD -- Index. | |
| 520 | _aMany books tell you what to do. This one tells you how.<p>If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.<p>Collect the necessary hardware and software and assemble your own network lab<p>Configure a bootable Linux CD<p>Explore various methods for gathering information about existing security<p>Identify automated attack and penetration tools<p>Understand cryptographic systems and encryption and authentication attacks<p>Learn to find, identify, and defeat malware<p>Address the special protection needs of wireless systems<p>Use Snort(R) to build an IDS that will help to detect and identify attacks in real time<p>DVD includes tools for actually building and implementing security solutions<p>Open source tools<p>Demo software<p>A bootable version of Linux | ||
| 650 | 0 |
_aComputer networks _x Security measures _x Testing. _92852 |
|
| 596 | _a1 | ||
| 999 |
_c934 _d934 |
||