Computer Security Lab Manual / Edition 1

Paperback (Print)
Buy New
Buy New from BN.com
$82.24
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (13) from $1.99   
  • New (3) from $2.49   
  • Used (10) from $1.99   

Overview

This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and detection and incident response. This book reinforces Security+ certification objectives and prepares students to work in the real world by applying networking concepts to solve real business problems.

This lab manual is suitable to accompany any security textbook, but an appendix maps the labs specifically for easy use with McGraw-Hill textbooks, Principles of Computer Security: Security+ and Beyond and Fundamentals of Network Security.

Read More Show Less

Product Details

  • ISBN-13: 9780072255089
  • Publisher: McGraw-Hill Higher Education
  • Publication date: 6/22/2005
  • Series: Information Assurance and Security Ser.
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 320
  • Sales rank: 1016935
  • Product dimensions: 7.50 (w) x 9.10 (h) x 1.20 (d)

Meet the Author

Vince Nestler (Pocatello, ID), CompTIA Security+, is an Adjunct Professor of network security at Capitol College. Nestler is an instructional design expert with seven years of experience developing security related labs. He is the coauthor of the first editon of Principles of Computer Security: Security+ and Beyond Lab Manual.

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin’s interests are information security, systems theory, and secure software design.

Greg White (San Antonio, TX), Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA, and was the author of the first edition of the Security+ All-in-One Exam Guide from McGraw-Hill.

Matthew Hirsch, M.S. Network Security, Capitol College; B.A. Physics, State University of New York (SUNY) New Paltz. Mr. Hirsch has worked in the information security operations group for a large financial firm (which prefers to remain unnamed), data distribution for firms including Deutsche Bank and Sanwa Securities, and systems / network administration for Market Arts Software. Formerly an adjunct professor at Capitol College, Katharine Gibbs school, and DeVry, Mr. Hirsch also enjoys a long term association with Dorsai, a New York City non-profit ISP/Hosting firm.

Read More Show Less

Table of Contents

Section 1 Networking Basics – How do networks work? Chapter 1 Workstation Network Configuration and ConnectivityChapter 2 TCP/UDP BasicsChapter 3 Network ApplicationsSection 2 – Vulnerabilities and Threats – How can networks be compromised? Chapter 4 Scanning and Enumerating the Network for TargetsChapter 5 Attacks-Web Server, Email, DOS and Trojan AttacksChapter 6 Escalating Privilege-Sniffing, Keylogging, Password Cracking AttacksSection 3 – Prevention – How do we prevent Harm to Networks? Chapter 7 Hardening the Host ComputerChapter 8 Securing Network CommunicationsSection 4 – Detection and Response – How do we detect and respond to attacks? Chapter 9 Preparing for and Detecting AttacksChapter 10 – Digital ForensicsAppendix - Lab Setup Instructions

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted Tue Feb 28 00:00:00 EST 2006

    Excellent Resource

    This book is an excellent resource for anyone interested in the information security field. Not only do the authors walk you through each lab step by step, they also explain what you are doing and why it is important. Additionally, they provide you with information on how to obtain the tools required for each lab, which can be done in both Linux and Windows environments. The book also provides additional projects to try for yourself if any of the topics arouse your interest. Kudos to Mr. Hirsch and Mr. Nestler for their input in this excellent book. As a former student of theirs, I can say that they are great Network Security instructors and I've learned a great deal from their classes and now, this book.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)