Wonder Club world wonders pyramid logo
×

Computer Security Lab Manual Book

Computer Security Lab Manual
Computer Security Lab Manual, This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and dete, Computer Security Lab Manual has a rating of 2.5 stars
   2 Ratings
X
Computer Security Lab Manual, This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and dete, Computer Security Lab Manual
2.5 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
50 %
2
50 %
1
0 %
Digital Copy
PDF format
1 available   for $99.99
Original Magazine
Physical Format

Sold Out

  • Computer Security Lab Manual
  • Written by author Vincent J. Nestler
  • Published by McGraw-Hill Companies, The, June 2005
  • This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and dete
  • This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and dete
Buy Digital  USD$99.99

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Section 1 Networking Basics – How do networks work?Chapter 1 Workstation Network Configuration and ConnectivityChapter 2 TCP/UDP BasicsChapter 3 Network ApplicationsSection 2 – Vulnerabilities and Threats – How can networks be compromised? Chapter 4 Scanning and Enumerating the Network for TargetsChapter 5 Attacks-Web Server, Email, DOS and Trojan AttacksChapter 6 Escalating Privilege-Sniffing, Keylogging, Password Cracking AttacksSection 3 – Prevention – How do we prevent Harm to Networks? Chapter 7 Hardening the Host ComputerChapter 8 Securing Network CommunicationsSection 4 – Detection and Response – How do we detect and respond to attacks? Chapter 9 Preparing for and Detecting AttacksChapter 10 – Digital ForensicsAppendix - Lab Setup Instructions


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Computer Security Lab Manual, This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and dete, Computer Security Lab Manual

X
WonderClub Home

This item is in your Collection

Computer Security Lab Manual, This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and dete, Computer Security Lab Manual

Computer Security Lab Manual

X
WonderClub Home

This Item is in Your Inventory

Computer Security Lab Manual, This lab manual provides a host of hands-on exercises that are the perfect supplement to your computer security textbook. Over 40 lab projects build from basic networking skills to identification of vulnerabilities, hardening of computer systems, and dete, Computer Security Lab Manual

Computer Security Lab Manual

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: