Computer Security Lab Manual / Edition 1

Paperback (Print)
Buy New
Buy New from
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Paperback)
  • All (18) from $1.99   
  • New (5) from $2.49   
  • Used (13) from $1.99   


This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and detection and incident response. This book reinforces Security+ certification objectives and prepares students to work in the real world by applying networking concepts to solve real business problems.

This lab manual is suitable to accompany any security textbook, but an appendix maps the labs specifically for easy use with McGraw-Hill textbooks, Principles of Computer Security: Security+ and Beyond and Fundamentals of Network Security.

Read More Show Less

Product Details

  • ISBN-13: 9780072255089
  • Publisher: McGraw-Hill Higher Education
  • Publication date: 6/22/2005
  • Series: Information Assurance and Security Ser.
  • Edition description: New Edition
  • Edition number: 1
  • Pages: 320
  • Product dimensions: 7.50 (w) x 9.10 (h) x 1.20 (d)

Meet the Author

Vince Nestler (Pocatello, ID), CompTIA Security+, is an Adjunct Professor of network security at Capitol College. Nestler is an instructional design expert with seven years of experience developing security related labs. He is the coauthor of the first editon of Principles of Computer Security: Security+ and Beyond Lab Manual.

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin’s interests are information security, systems theory, and secure software design.

Greg White (San Antonio, TX), Security+, CISSP, is an Associate Professor in the Department of Computer Science at the University of Texas at San Antonio. Dr. White is the Director of the Center for Infrastructure Assurance and Security at UTSA, and was the author of the first edition of the Security+ All-in-One Exam Guide from McGraw-Hill.

Matthew Hirsch, M.S. Network Security, Capitol College; B.A. Physics, State University of New York (SUNY) New Paltz. Mr. Hirsch has worked in the information security operations group for a large financial firm (which prefers to remain unnamed), data distribution for firms including Deutsche Bank and Sanwa Securities, and systems / network administration for Market Arts Software. Formerly an adjunct professor at Capitol College, Katharine Gibbs school, and DeVry, Mr. Hirsch also enjoys a long term association with Dorsai, a New York City non-profit ISP/Hosting firm.

Read More Show Less

Table of Contents

Section 1 Networking Basics – How do networks work? Chapter 1 Workstation Network Configuration and ConnectivityChapter 2 TCP/UDP BasicsChapter 3 Network ApplicationsSection 2 – Vulnerabilities and Threats – How can networks be compromised? Chapter 4 Scanning and Enumerating the Network for TargetsChapter 5 Attacks-Web Server, Email, DOS and Trojan AttacksChapter 6 Escalating Privilege-Sniffing, Keylogging, Password Cracking AttacksSection 3 – Prevention – How do we prevent Harm to Networks? Chapter 7 Hardening the Host ComputerChapter 8 Securing Network CommunicationsSection 4 – Detection and Response – How do we detect and respond to attacks? Chapter 9 Preparing for and Detecting AttacksChapter 10 – Digital ForensicsAppendix - Lab Setup Instructions

Read More Show Less

Customer Reviews

Average Rating 5
( 1 )
Rating Distribution

5 Star


4 Star


3 Star


2 Star


1 Star


Your Rating:

Your Name: Create a Pen Name or

Barnes & Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation


  • - By submitting a review, you grant to Barnes & and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Terms of Use.
  • - Barnes & reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted February 28, 2006

    Excellent Resource

    This book is an excellent resource for anyone interested in the information security field. Not only do the authors walk you through each lab step by step, they also explain what you are doing and why it is important. Additionally, they provide you with information on how to obtain the tools required for each lab, which can be done in both Linux and Windows environments. The book also provides additional projects to try for yourself if any of the topics arouse your interest. Kudos to Mr. Hirsch and Mr. Nestler for their input in this excellent book. As a former student of theirs, I can say that they are great Network Security instructors and I've learned a great deal from their classes and now, this book.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)