Computer security lab manual / (Record no. 104)

MARC details
000 -LEADER
fixed length control field 02842cam a22002774a 4500
001 - CONTROL NUMBER
control field 13961847
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20231114121732.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 050511s2006 maua f 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2005049595
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 97800722550809
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 0072255080 (alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Modifying agency BUL
Language of cataloging ENG
Description conventions RDA
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
Item number COM.
245 00 - TITLE STATEMENT
Title Computer security lab manual /
Statement of responsibility, etc. Vincent J. Nestler ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston :
Name of publisher, distributor, etc. McGraw-Hill Irwin,
Date of publication, distribution, etc. c2006.
300 ## - PHYSICAL DESCRIPTION
Extent xix, 759 p. :
Other physical details ill. ;
Dimensions 24 cm.
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE
Title Information assurance & security series
500 ## - GENERAL NOTE
General note Table of Content <br/>SECTION 1 NETWORKING BASICS: HOW DO NETWORKS WORK?<br/>Chapter 1 WORKSTATION NETWORK CONFIGURATION AND CONNECTIVITY<br/>Lab1: Network workstation client configuration<br/>Lab2: Computer name resolution<br/>Lab3: Network routing basics<br/>Lab4: Network communication analysis<br/><br/>Chapter 2 TCP/UDP BASICS<br/>Lab5: TCP basics<br/>Lab6: UDP basics<br/><br/>Chapter 3 NETWORK APPLICATIONS<br/>Lab7: FTP communication<br/>Lab8: Port connection status<br/>Lab9: E-mail protocols_SMTP and POP<br/>Lab10: E-mail client software<br/><br/>SECTION 2 VULNERABILITIES AND THREATS _ HOW CAN NETWORKS BE COMPROMISED?<br/>Chapter 4 SCANNING AND ENUMERATING THE NETWORK FOR TARGETS<br/>Lab12: IP address and port scanning, service identity determination<br/>Lab14: GUI-Based vulnerability scanners<br/><br/>Chapter 5 ATTACKS - WEB SERVER, E-MAIL,DOS, AND TROJAN ATTACKS<br/>Lab15: Web server exploits<br/>Lab16: E-mail system exploits<br/>Lab17: Denial of service exploits<br/>Lab18: Trojan attacks<br/><br/>Chapter 6 ESCALATING PRIVILEGE- SNIFFING, KEY LOGGING, PASSWORD-CRACKING ATTACKS<br/>Lab19: Intercepting and sniffing network traffic<br/>Lab20: Keystroke logging<br/>Lab21: Password cracking<br/>Lab22: Man-in-the-middle attack<br/>etc.<br/><br/>SECTION 3 REVENTION-HOW DO WE PREVENT HARM TO NETWORKS?<br/>Chapter 7 HARDENING THE HOST COMPUTER<br/>Lab24: Hardening the operating system<br/>Lab25: Windows XP service pack 2<br/>Lab26: Using anti-virus applications<br/>Lab27: Using firewalls<br/><br/>Chapter 8 SECURING NETWORK COMMUNICATIONS<br/>Lab28: Using GPG to encrypt and sign e-mail<br/>Lab29: using secure shell<br/>Lab30: using secure copy<br/>Lab31: Using certificates and SSL<br/>etc.<br/><br/>SECTION 4 DETECTION AND RESPONSE-HOW DO WE DETECT AND RESPOND TO ATTACKS?<br/>Chapter 9 PREPARING FOR AND DETECTING ATTACKS<br/>Lab33: System log file analysis<br/>Lab34: Intrusion detection systems<br/>Lab35: Using honeypots<br/>Lab36: Detecting spyware<br/><br/>Chapter 10 DIGITAL FORENSICS<br/>Lab 38: Initial Response--Incident Determination<br/>Lab 39: Acquiring the Data<br/>Lab 40: Forensic Analysis<br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Index : p. 741 - 759
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Data protection
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Nestler, Vincent J.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Open Access
Classification part 005.8
Item part 1
Call number prefix COM.
Call number suffix 005.8 COM.
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 01/22/2021 Donation 0014934   005.8 COM. 1 BUML23111930 01/22/2021 1 01/22/2021 Book Open Access
    Dewey Decimal Classification     Engineering Library Engineering Library 02/23/2021 Donation 0014935   005.8 COM.2 BUML23111915 02/23/2021 2 02/23/2021 Book Open Access
    Dewey Decimal Classification     Engineering Library Engineering Library 02/23/2021 Donation 0014930   005.8 COM. 3 BUML23111928 02/23/2021 3 02/23/2021 Book Open Access
    Dewey Decimal Classification     Engineering Library Engineering Library 02/23/2021 Donation 0014929   005.8 COM.4 BUML23111922 02/23/2021 4 02/23/2021 Book Open Access
    Dewey Decimal Classification     Engineering Library Engineering Library 02/23/2021 Donation 0014933   005.8 COM.5 BUML23111924 02/23/2021 5 02/23/2021 Book Open Access
    Dewey Decimal Classification     Engineering Library Engineering Library 02/23/2021 Donation 0014931   005.8 COM. 6 BUML23111925 02/23/2021 6 02/23/2021 Book Open Access
    Dewey Decimal Classification     Engineering Library Engineering Library 02/23/2021 Donation 0014932   005.8 COM. 7 BUML23111932 02/23/2021 7 02/23/2021 Book Open Access