skip to content
Build your own security lab : a field guide for network testing Preview this item
ClosePreview this item
Checking...

Build your own security lab : a field guide for network testing

Author: Michael Gregg
Publisher: Indianapolis, IN : Wiley, ©2008.
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
"If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Michael Gregg
ISBN: 9780470179864 0470179864
OCLC Number: 166873219
Notes: Includes index.
Description: xxvi, 428 pages : illustrations ; 24 cm + 1 DVD (4 3/4 in.)
Details: Systems requirements for accompanying DVD: PC running Windows 98 or later; Internet connection; R/W DVD-ROM drive; 256 MB memory minimum; 512 MB or more recommended.
Contents: 1. Hardware and Gear --
2. Building a Software Test Platform --
3. Passive Information Gathering --
4. Detecting Live Systems --
5. Enumerating Systems --
6. Automated Attack and Penetration Tools --
7. Understanding Cryptographic Systems --
8. Defeating Malware --
9. Securing Wireless Systems --
10. Intrusion Detection --
11. Forensic Detection.
Responsibility: Michael Gregg.
More information:

Abstract:

If your job is to design or implement IT security solutions or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs,  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/166873219> # Build your own security lab : a field guide for network testing
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "166873219" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/inu> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/819593950#Place/indianapolis_in> ; # Indianapolis, IN
   schema:about <http://dewey.info/class/005.8/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/819593950#Topic/redes_de_computadores_medidas_de_seguridad_pruebas> ; # Redes de computadores--Medidas de seguridad--Pruebas
   schema:about <http://experiment.worldcat.org/entity/work/data/819593950#Topic/computer_networks_security_measures_testing> ; # Computer networks--Security measures--Testing
   schema:bookFormat bgn:PrintBook ;
   schema:copyrightYear "2008" ;
   schema:creator <http://viaf.org/viaf/119831304> ; # Michael C. Gregg
   schema:datePublished "2008" ;
   schema:description "1. Hardware and Gear -- 2. Building a Software Test Platform -- 3. Passive Information Gathering -- 4. Detecting Live Systems -- 5. Enumerating Systems -- 6. Automated Attack and Penetration Tools -- 7. Understanding Cryptographic Systems -- 8. Defeating Malware -- 9. Securing Wireless Systems -- 10. Intrusion Detection -- 11. Forensic Detection."@en ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/819593950> ;
   schema:inLanguage "en" ;
   schema:name "Build your own security lab : a field guide for network testing"@en ;
   schema:productID "166873219" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/166873219#PublicationEvent/indianapolis_in_wiley_2008> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/819593950#Agent/wiley> ; # Wiley
   schema:reviews <http://www.worldcat.org/title/-/oclc/166873219#Review/340311965> ;
   schema:url <http://catdir.loc.gov/catdir/enhancements/fy0814/2008009610-t.html> ;
   schema:workExample <http://worldcat.org/isbn/9780470179864> ;
   umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA790682> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/166873219> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/819593950#Place/indianapolis_in> # Indianapolis, IN
    a schema:Place ;
   schema:name "Indianapolis, IN" ;
    .

<http://experiment.worldcat.org/entity/work/data/819593950#Topic/computer_networks_security_measures_testing> # Computer networks--Security measures--Testing
    a schema:Intangible ;
   schema:hasPart <http://id.loc.gov/authorities/subjects/sh94001277> ;
   schema:name "Computer networks--Security measures--Testing"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/819593950#Topic/redes_de_computadores_medidas_de_seguridad_pruebas> # Redes de computadores--Medidas de seguridad--Pruebas
    a schema:Intangible ;
   schema:name "Redes de computadores--Medidas de seguridad--Pruebas"@en ;
    .

<http://viaf.org/viaf/119831304> # Michael C. Gregg
    a schema:Person ;
   schema:familyName "Gregg" ;
   schema:givenName "Michael C." ;
   schema:givenName "Michael" ;
   schema:name "Michael C. Gregg" ;
    .

<http://worldcat.org/isbn/9780470179864>
    a schema:ProductModel ;
   schema:isbn "0470179864" ;
   schema:isbn "9780470179864" ;
    .

<http://www.worldcat.org/title/-/oclc/166873219#Review/340311965>
    a schema:Review ;
   schema:itemReviewed <http://www.worldcat.org/oclc/166873219> ; # Build your own security lab : a field guide for network testing
   schema:reviewBody ""If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future."--Jacket." ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.