Principles of Computer Security Lab Manual, Fourth Edition / Edition 4

Principles of Computer Security Lab Manual, Fourth Edition / Edition 4

ISBN-10:
0071836551
ISBN-13:
9780071836555
Pub. Date:
11/03/2014
Publisher:
McGraw Hill LLC
ISBN-10:
0071836551
ISBN-13:
9780071836555
Pub. Date:
11/03/2014
Publisher:
McGraw Hill LLC
Principles of Computer Security Lab Manual, Fourth Edition / Edition 4

Principles of Computer Security Lab Manual, Fourth Edition / Edition 4

$64.0
Current price is , Original price is $64.0. You
$64.00 
  • SHIP THIS ITEM
    In stock. Ships in 1-2 days.
  • PICK UP IN STORE

    Your local store may have stock of this item.

$41.31  $64.00 Save 35% Current price is $41.31, Original price is $64. You Save 35%.
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.

    Note: Access code and/or supplemental material are not guaranteed to be included with used textbook.

Overview

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Practice the Computer Security Skills You Need to Succeed!

  • 40+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build your vocabulary
  • Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines

In this Lab Manual, you'll practice

  • Configuring workstation network connectivity
  • Analyzing network communication
  • Establishing secure network application communication using TCP/IP protocols
  • Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
  • Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
  • Combatting Trojans, man-in-the-middle attacks, and steganography
  • Hardening a host computer, using antivirus applications, and configuring firewalls
  • Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
  • Preparing for and detecting attacks
  • Backing up and restoring data
  • Handling digital forensics and incident response

Instructor resources available:

  • This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately
  • Virtual machine files
  • Solutions to the labs are not included in the book and are only available to adopting instructors

Product Details

ISBN-13: 9780071836555
Publisher: McGraw Hill LLC
Publication date: 11/03/2014
Edition description: List
Pages: 384
Product dimensions: 8.40(w) x 10.80(h) x 1.00(d)

About the Author

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin’s interests are information security, systems theory, and secure software design.

Vincent Nestler, Ph.D. (San Bernadino, CA), visiting professor of network security at California State University, San Bernadino, is an instructional design expert with 10 years of experience developing security-related labs.

Keith Harrison, Ph.D. (San Antonio, TX), is the lead developer of the Collegiate Cyber Defense Competition (CCDC) Scoring Engine, and the CyberPatriot Competition System (CCS) Scoring Engine.

Matthew Hirsch (New York, NY) has worked in the information security operations group for a large financial firm, data distribution for Deutsche Bank and Sanwa Securities, and systems / network administration for Market Arts Software.

Wm. Arthur Conklin, Ph.D., CompTIA Security+, CISSP (Houston, TX) is an assistant professor in the Information and Logistics Technology Department at the University of Houston.



Matthew Hirsch, M.S. Network Security, Capitol College; B.A. Physics, State University of New York (SUNY) New Paltz. Mr. Hirsch has worked in the information security operations group for a large financial firm (which prefers to remain unnamed), data distribution for firms including Deutsche Bank and Sanwa Securities, and systems / network administration for Market Arts Software. Formerly an adjunct professor at Capitol College, Katharine Gibbs school, and DeVry, Mr. Hirsch also enjoys a long term association with Dorsai, a New York City non-profit ISP/Hosting firm.

Table of Contents

Part I: Networking Basics: How Do Networks Work
1. Workstation Network Configuration and Connectivity
2. Network Transports
3. Network Applications
Part II: Vulnerabilities and Threats—How Can Systems Be Compromised
4. Penetration Testing
5. Attacks—Attacks Against Applications
6. Escalating Privilege—Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems
7. Hardening the Host Computer
8. Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks
9. Preparing for and Detecting Attacks
10. Digital Forensics
From the B&N Reads Blog

Customer Reviews