Principles of Computer Security Lab Manual, Fourth Edition

by ; ; ;
Edition: 4th
Format: Paperback
Pub. Date: 2014-11-03
Publisher(s): McGraw-Hill Education
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $58.97

Buy New

Arriving Soon. Will ship when available.
$56.16

Buy Used

Arriving Soon. Will ship when available.
$42.66

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$72.00
$72.00

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

Practice the Computer Security Skills You Need to Succeed!

  • 40+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build your vocabulary

In this Lab Manual, you'll practice

  • Configuring workstation network connectivity
  • Analyzing network communication
  • Establishing secure network application communication using TCP/IP protocols
  • Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
  • Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
  • Combatting Trojans, man-in-the-middle attacks, and steganography
  • Hardening a host computer, using antivirus applications, and configuring firewalls
  • Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
  • Preparing for and detecting attacks
  • Backing up and restoring data
  • Handling digital forensics and incident response

Table of Contents

Part I: Networking Basics: How Do Networks Work
1. Workstation Network Configuration and Connectivity
2. Network Transports
3. Network Applications
Part II: Vulnerabilities and Threats--How Can Systems Be Compromised
4. Penetration Testing
5. Attacks--Attacks Against Applications
6. Escalating Privilege--Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems
7. Hardening the Host Computer
8. Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks
9. Preparing for and Detecting Attacks
10. Digital Forensics

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.