CART

(0) items

Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

by ; ; ; ;
Edition:
2nd
ISBN13:

9780071748568

ISBN10:
0071748563
Format:
Paperback
Pub. Date:
12/9/2010
Publisher(s):
McGraw-Hill Osborne Media
List Price: $42.12

Buy Used Textbook

(Recommended)
In Stock Usually Ships in 24-48 Hours
$29.48

Buy New Textbook

Usually Ships in 3-4 Business Days
$41.07

eTextbook


 
Duration
Price
$46.80

Rent Textbook

We're Sorry
Sold Out

More New and Used
from Private Sellers
Starting at $15.23

Questions About This Book?

What version or edition is this?
This is the 2nd edition with a publication date of 12/9/2010.
What is included with this book?
  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
  • The Used copy of this book is not guaranteed to inclue any supplemental materials. Typically, only the book itself is included.

Related Products


  • Computer Security Lab Manual
    Computer Security Lab Manual
  • Principles of Computer Security : Security+ and Beyond
    Principles of Computer Security : Security+ and Beyond
  • Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301), 3rd Edition
    Principles of Computer Security CompTIA Security+ and Beyond (Exam SY0-301), 3rd Edition
  • Principles of Computer Security Lab Manual, Fourth Edition
    Principles of Computer Security Lab Manual, Fourth Edition
  • Principles of Computer Security, CompTIA Security+ and Beyond, Second Edition
    Principles of Computer Security, CompTIA Security+ and Beyond, Second Edition
  • Principles of Computer Security, Fourth Edition
    Principles of Computer Security, Fourth Edition




Summary

Written by leading IT security educators, this fully updated Lab Manual supplementsPrinciples of Computer Security: CompTIA Security+ and Beyond, Second EditionPrinciples of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence toPrinciples of Computer Security: CompTIA Security+ and Beyond, Second Edition.The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.Principles of Computer Security Lab Manual, Second Edition, features: New, more dynamic design and a larger trim size The real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center)All-inclusive coverage: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy

Table of Contents

Part I: Networking Basics: How Do Networks Work?
Chapter 1: Workstation Network Configuration and Connectivity
Chapter 2: TCP/UDP Basics
Chapter 3: Network Applications
Part II: Vulnerabilities and Threats - How Can Systems Be Compromised?
Chapter 4: Scanning and Enumerating the Network for Targets
Chapter 5: Attacks—Web Server, E-mail, DOS, and Trojan Attacks
Chapter 6: Escalating Privilege— Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems?
Chapter 7: Hardening the Host Computer
Chapter 8: Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks?
Chapter 9: Preparing for and Detecting Attacks
Chapter 10: Digital Forensics


Please wait while the item is added to your cart...