rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780071748568

Principles of Computer Security CompTIA Security+ and Beyond Lab Manual, Second Edition

by ; ; ; ;
  • ISBN13:

    9780071748568

  • ISBN10:

    0071748563

  • Edition: 2nd
  • Format: Paperback
  • Copyright: 2010-12-30
  • Publisher: McGraw-Hill Osborne Media
  • View Upgraded Edition
  • Purchase Benefits
List Price: $45.45
  • Digital
    $50.00*
    Add to Cart

    DURATION
    PRICE
    *To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.

Summary

Written by leading IT security educators, this fully updated Lab Manual supplementsPrinciples of Computer Security: CompTIA Security+ and Beyond, Second EditionPrinciples of Computer Security Lab Manual, Second Edition, contains more than 30 labs that challenge you to solve real-world problems with key concepts. Clear, measurable lab objectives map to CompTIA Security+ certification exam objectives, ensuring clear correspondence toPrinciples of Computer Security: CompTIA Security+ and Beyond, Second Edition.The Lab Manual also includes materials lists and lab set-up instructions. Step-by-step, not click-by click, lab scenarios require you to think critically, and Hint and Warning icons aid you through potentially tricky situations. Post-lab observation questions measure your understanding of lab results and the Key Term Quiz helps to build vocabulary.Principles of Computer Security Lab Manual, Second Edition, features: New, more dynamic design and a larger trim size The real-world, hands-on practice you need to pass the certification exam and succeed on the job Lab solutions on the textbook OLC (Online Learning Center)All-inclusive coverage: Introduction and Security Trends; General Security Concepts; Operational/Organizational Security; The Role of People in Security; Cryptography; Public Key Infrastructure; Standards and Protocols; Physical Security; Network Fundamentals; Infrastructure Security; Authentication and Remote Access; Wireless Security; Intrusion Detection Systems and Network Security; Baselines; Types of Attacks and Malicious Software; E-mail and Instant Messaging; Web Components; Secure Software Development; Disaster Recovery, Business Continuity, and Organizational Policies; Risk Management; Change Management; Privilege Management; Computer Forensics; Legal Issues and Ethics; Privacy

Table of Contents

Part I: Networking Basics: How Do Networks Work?
Chapter 1: Workstation Network Configuration and Connectivity
Chapter 2: TCP/UDP Basics
Chapter 3: Network Applications
Part II: Vulnerabilities and Threats - How Can Systems Be Compromised?
Chapter 4: Scanning and Enumerating the Network for Targets
Chapter 5: Attacks—Web Server, E-mail, DOS, and Trojan Attacks
Chapter 6: Escalating Privilege— Sniffing, Keylogging, Password-Cracking Attacks
Part III: Prevention: How Do We Prevent Harm to Systems?
Chapter 7: Hardening the Host Computer
Chapter 8: Securing Network Communications
Part IV: Detection and Response: How Do We Detect and Respond to Attacks?
Chapter 9: Preparing for and Detecting Attacks
Chapter 10: Digital Forensics

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program