Computer security lab manual /

Computer security lab manual / Vincent J. Nestler ... [et al.]. - Boston : McGraw-Hill Irwin, c2006. - xix, 759 p. : ill. ; 24 cm. - Information assurance & security series .

Table of Content
SECTION 1 NETWORKING BASICS: HOW DO NETWORKS WORK?
Chapter 1 WORKSTATION NETWORK CONFIGURATION AND CONNECTIVITY
Lab1: Network workstation client configuration
Lab2: Computer name resolution
Lab3: Network routing basics
Lab4: Network communication analysis

Chapter 2 TCP/UDP BASICS
Lab5: TCP basics
Lab6: UDP basics

Chapter 3 NETWORK APPLICATIONS
Lab7: FTP communication
Lab8: Port connection status
Lab9: E-mail protocols_SMTP and POP
Lab10: E-mail client software

SECTION 2 VULNERABILITIES AND THREATS _ HOW CAN NETWORKS BE COMPROMISED?
Chapter 4 SCANNING AND ENUMERATING THE NETWORK FOR TARGETS
Lab12: IP address and port scanning, service identity determination
Lab14: GUI-Based vulnerability scanners

Chapter 5 ATTACKS - WEB SERVER, E-MAIL,DOS, AND TROJAN ATTACKS
Lab15: Web server exploits
Lab16: E-mail system exploits
Lab17: Denial of service exploits
Lab18: Trojan attacks

Chapter 6 ESCALATING PRIVILEGE- SNIFFING, KEY LOGGING, PASSWORD-CRACKING ATTACKS
Lab19: Intercepting and sniffing network traffic
Lab20: Keystroke logging
Lab21: Password cracking
Lab22: Man-in-the-middle attack
etc.

SECTION 3 REVENTION-HOW DO WE PREVENT HARM TO NETWORKS?
Chapter 7 HARDENING THE HOST COMPUTER
Lab24: Hardening the operating system
Lab25: Windows XP service pack 2
Lab26: Using anti-virus applications
Lab27: Using firewalls

Chapter 8 SECURING NETWORK COMMUNICATIONS
Lab28: Using GPG to encrypt and sign e-mail
Lab29: using secure shell
Lab30: using secure copy
Lab31: Using certificates and SSL
etc.

SECTION 4 DETECTION AND RESPONSE-HOW DO WE DETECT AND RESPOND TO ATTACKS?
Chapter 9 PREPARING FOR AND DETECTING ATTACKS
Lab33: System log file analysis
Lab34: Intrusion detection systems
Lab35: Using honeypots
Lab36: Detecting spyware

Chapter 10 DIGITAL FORENSICS
Lab 38: Initial Response--Incident Determination
Lab 39: Acquiring the Data
Lab 40: Forensic Analysis


Index : p. 741 - 759

97800722550809 0072255080 (alk. paper)

2005049595


Computer security
Data protection

005.8 / COM.