did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

Principles of Computer Security Lab Manual, Fourth Edition

9780071836555

Principles of Computer Security Lab Manual, Fourth Edition

  • ISBN 13:

    9780071836555

  • ISBN 10:

    0071836551

  • Edition: 4th
  • Format: Paperback
  • Copyright: 11/03/2014
  • Publisher: McGraw-Hill Education
  • Newer Edition

List Price $56.16 Save

Rent $45.15
TERM PRICE DUE
Added Benefits of Renting

Free Shipping Both Ways Free Shipping Both Ways
Highlight/Take Notes Like You Own It Highlight/Take Notes Like You Own It
Purchase/Extend Before Due Date Purchase/Extend Before Due Date

List Price $56.16 Save $8.79

Used $47.37

Usually Ships in 24-48 Hours

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

List Price $56.16 Save $0.56

New $55.60

Usually Ships in 3-4 Business Days

We Buy This Book Back We Buy This Book Back!

Included with your book

Free Shipping On Every Order Free Shipping On Every Order

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Extend or Purchase Your Rental at Any Time

Need to keep your rental past your due date? At any time before your due date you can extend or purchase your rental through your account.

Summary

Practice the Computer Security Skills You Need to Succeed!

  • 40+ lab exercises challenge you to solve problems based on realistic case studies
  • Step-by-step scenarios require you to think critically
  • Lab analysis tests measure your understanding of lab results
  • Lab analysis tests measure your understanding of lab results
  • Key term quizzes help build your vocabulary

In this Lab Manual, you'll practice

  • Configuring workstation network connectivity
  • Analyzing network communication
  • Establishing secure network application communication using TCP/IP protocols
  • Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
  • Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
  • Combatting Trojans, man-in-the-middle attacks, and steganography
  • Hardening a host computer, using antivirus applications, and configuring firewalls
  • Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
  • Preparing for and detecting attacks
  • Backing up and restoring data
  • Handling digital forensics and incident response

Table of Contents

Read more