Principles of Computer Security Lab Manual, Fourth Edition

by ; ; ;
  • ISBN13:


  • ISBN10:


  • Edition: 4th
  • Format: Paperback
  • Copyright: 11/3/2014
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
  • We Buy This Book Back!
    In-Store Credit: $2.63
    Check/Direct Deposit: $2.50
List Price: $56.16 Save up to $5.62
  • Rent Book $50.54
    Add to Cart Free Shipping


Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.


Practice the Computer Security Skills You Need to Succeed!

  • 40+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build your vocabulary

In this Lab Manual, you'll practice

  • Configuring workstation network connectivity
  • Analyzing network communication
  • Establishing secure network application communication using TCP/IP protocols
  • Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
  • Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
  • Combatting Trojans, man-in-the-middle attacks, and steganography
  • Hardening a host computer, using antivirus applications, and configuring firewalls
  • Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
  • Preparing for and detecting attacks
  • Backing up and restoring data
  • Handling digital forensics and incident response

Table of Contents

Part I: Networking Basics: How Do Networks Work
1. Workstation Network Configuration and Connectivity
2. Network Transports
3. Network Applications
Part II: Vulnerabilities and Threats--How Can Systems Be Compromised
4. Penetration Testing
5. Attacks--Attacks Against Applications
6. Escalating Privilege--Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems
7. Hardening the Host Computer
8. Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks
9. Preparing for and Detecting Attacks
10. Digital Forensics

Rewards Program

Write a Review