Network vulnerability assessment identify security loopholes in your network's infrastructure

Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model.

Saved in:
Bibliographic Details
Main Author: Rahalkar, Sagar (Author)
Format: Book
Language:English
Published: Birmingham, UK Packt Publishing 2018
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 52333
003 MY-KLNDU
005 20241219014151.0
008 221104 2018 xxka ai 001 0 eng d
020 |a 9781788627252 (paperback) 
020 |a 1788627253 (paperback) 
039 9 |a 202211041223  |b VLOAD  |c 201910141044  |d johari  |y 201904111018  |z helmey 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a TK 5105.59  |b .R34 2018 
100 1 |a Rahalkar, Sagar,  |e author. 
245 1 0 |a Network vulnerability assessment  |b identify security loopholes in your network's infrastructure  |c Sagar Rahalkar. 
264 1 |a Birmingham, UK  |b Packt Publishing  |c 2018 
300 |a vi, 241 pages  |b illustrations  |c 24 cm. 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
500 |a Includes index. 
520 |a Being able to identify security loopholes has become critical to many businesses. That's where learning network security assessment becomes very important. This book will not only show you how to find out the system vulnerabilities but also help you build a network security threat model. 
592 |a 37502  |b 01/08/2019  |c RM 243.53  |h Bookline 
650 0 |a Computer networks  |x Security measures  |x Evaluation. 
650 0 |a Computer network protocols  |x Security measures  |x Evaluation. 
999 |a vtls000063630  |c 52333  |d 52333