Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition / Edition 2

Paperback (Print)
Rent
Rent from BN.com
$12.14
(Save 70%)
Est. Return Date: 09/28/2014
Used and New from Other Sellers
Used and New from Other Sellers
from $8.24
Usually ships in 1-2 business days
(Save 79%)
Other sellers (Paperback)
  • All (15) from $8.24   
  • New (8) from $22.10   
  • Used (7) from $8.24   

Overview

Written by leading IT security educators, this fully updated Lab Manual supplements Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition

Principles of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence to Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition.

The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.

Principles of Computer Security Lab Manual, Second Edition, features:

  • New, more dynamic design and a larger trim size
  • The real-world, hands-on practice you need to pass the certification exam and succeed on the job
  • Lab solutions on the textbook OLC (Online Learning Center)

All-inclusive coverage:

Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy

Read More Show Less

Product Details

  • ISBN-13: 9780071748568
  • Publisher: McGraw-Hill Professional Publishing
  • Publication date: 12/9/2010
  • Series: CompTIA Authorized Series
  • Edition number: 2
  • Pages: 352
  • Sales rank: 719,869
  • Product dimensions: 8.30 (w) x 10.70 (h) x 1.00 (d)

Meet the Author

Vincent Nestler, CompTIA Security+, is an adjunct professor of network security at Capitol College. He is an instructional design expert with seven years of experience developing security-related labs. Nestler is the coauthor of the first editon of Principles of Computer Security: Security+ and Beyond Lab Manual.

Greg White, CompTIA Security+, CISSP, is an associate professor in the Department of Computer Science at the University of Texas at San Antonio. He is the Director of the Center for Infrastructure Assurance and Security at UTSA, and coauthored CompTIA Security+ All-in-One Exam Guide, Second Edition.

Wm. Arthur Conklin, CompTIA Security+, CISSP, is an assistant professor in the Information and Logistics Technology department at the University of Houston. He is the coauthor of CompTIA Security+ All-in-One Exam Guide, Second Edition.

Read More Show Less

Table of Contents

Part I: Networking Basics: How Do Networks Work?
Chapter 1: Workstation Network Configuration and Connectivity
Chapter 2: TCP/UDP Basics
Chapter 3: Network Applications
Part II: Vulnerabilities and Threats - How Can Systems Be Compromised?
Chapter 4: Scanning and Enumerating the Network for Targets
Chapter 5: Attacks—Web Server, E-mail, DOS, and Trojan Attacks
Chapter 6: Escalating Privilege— Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems?
Chapter 7: Hardening the Host Computer
Chapter 8: Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks?
Chapter 9: Preparing for and Detecting Attacks
Chapter 10: Digital Forensics

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)