Computer security lab manual / (Record no. 104)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02842cam a22002774a 4500 |
001 - CONTROL NUMBER | |
control field | 13961847 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20231114121732.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 050511s2006 maua f 001 0 eng |
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
LC control number | 2005049595 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 97800722550809 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 0072255080 (alk. paper) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | BUL |
Transcribing agency | BUL |
Modifying agency | BUL |
Language of cataloging | ENG |
Description conventions | RDA |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 22 |
Item number | COM. |
245 00 - TITLE STATEMENT | |
Title | Computer security lab manual / |
Statement of responsibility, etc. | Vincent J. Nestler ... [et al.]. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Boston : |
Name of publisher, distributor, etc. | McGraw-Hill Irwin, |
Date of publication, distribution, etc. | c2006. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xix, 759 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
440 #0 - SERIES STATEMENT/ADDED ENTRY--TITLE | |
Title | Information assurance & security series |
500 ## - GENERAL NOTE | |
General note | Table of Content <br/>SECTION 1 NETWORKING BASICS: HOW DO NETWORKS WORK?<br/>Chapter 1 WORKSTATION NETWORK CONFIGURATION AND CONNECTIVITY<br/>Lab1: Network workstation client configuration<br/>Lab2: Computer name resolution<br/>Lab3: Network routing basics<br/>Lab4: Network communication analysis<br/><br/>Chapter 2 TCP/UDP BASICS<br/>Lab5: TCP basics<br/>Lab6: UDP basics<br/><br/>Chapter 3 NETWORK APPLICATIONS<br/>Lab7: FTP communication<br/>Lab8: Port connection status<br/>Lab9: E-mail protocols_SMTP and POP<br/>Lab10: E-mail client software<br/><br/>SECTION 2 VULNERABILITIES AND THREATS _ HOW CAN NETWORKS BE COMPROMISED?<br/>Chapter 4 SCANNING AND ENUMERATING THE NETWORK FOR TARGETS<br/>Lab12: IP address and port scanning, service identity determination<br/>Lab14: GUI-Based vulnerability scanners<br/><br/>Chapter 5 ATTACKS - WEB SERVER, E-MAIL,DOS, AND TROJAN ATTACKS<br/>Lab15: Web server exploits<br/>Lab16: E-mail system exploits<br/>Lab17: Denial of service exploits<br/>Lab18: Trojan attacks<br/><br/>Chapter 6 ESCALATING PRIVILEGE- SNIFFING, KEY LOGGING, PASSWORD-CRACKING ATTACKS<br/>Lab19: Intercepting and sniffing network traffic<br/>Lab20: Keystroke logging<br/>Lab21: Password cracking<br/>Lab22: Man-in-the-middle attack<br/>etc.<br/><br/>SECTION 3 REVENTION-HOW DO WE PREVENT HARM TO NETWORKS?<br/>Chapter 7 HARDENING THE HOST COMPUTER<br/>Lab24: Hardening the operating system<br/>Lab25: Windows XP service pack 2<br/>Lab26: Using anti-virus applications<br/>Lab27: Using firewalls<br/><br/>Chapter 8 SECURING NETWORK COMMUNICATIONS<br/>Lab28: Using GPG to encrypt and sign e-mail<br/>Lab29: using secure shell<br/>Lab30: using secure copy<br/>Lab31: Using certificates and SSL<br/>etc.<br/><br/>SECTION 4 DETECTION AND RESPONSE-HOW DO WE DETECT AND RESPOND TO ATTACKS?<br/>Chapter 9 PREPARING FOR AND DETECTING ATTACKS<br/>Lab33: System log file analysis<br/>Lab34: Intrusion detection systems<br/>Lab35: Using honeypots<br/>Lab36: Detecting spyware<br/><br/>Chapter 10 DIGITAL FORENSICS<br/>Lab 38: Initial Response--Incident Determination<br/>Lab 39: Acquiring the Data<br/>Lab 40: Forensic Analysis<br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Index : p. 741 - 759 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Data protection |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Nestler, Vincent J. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book Open Access |
Classification part | 005.8 |
Item part | 1 |
Call number prefix | COM. |
Call number suffix | 005.8 COM. |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Engineering Library | Engineering Library | 01/22/2021 | Donation | 0014934 | 005.8 COM. 1 | BUML23111930 | 01/22/2021 | 1 | 01/22/2021 | Book Open Access | |||||
Dewey Decimal Classification | Engineering Library | Engineering Library | 02/23/2021 | Donation | 0014935 | 005.8 COM.2 | BUML23111915 | 02/23/2021 | 2 | 02/23/2021 | Book Open Access | |||||
Dewey Decimal Classification | Engineering Library | Engineering Library | 02/23/2021 | Donation | 0014930 | 005.8 COM. 3 | BUML23111928 | 02/23/2021 | 3 | 02/23/2021 | Book Open Access | |||||
Dewey Decimal Classification | Engineering Library | Engineering Library | 02/23/2021 | Donation | 0014929 | 005.8 COM.4 | BUML23111922 | 02/23/2021 | 4 | 02/23/2021 | Book Open Access | |||||
Dewey Decimal Classification | Engineering Library | Engineering Library | 02/23/2021 | Donation | 0014933 | 005.8 COM.5 | BUML23111924 | 02/23/2021 | 5 | 02/23/2021 | Book Open Access | |||||
Dewey Decimal Classification | Engineering Library | Engineering Library | 02/23/2021 | Donation | 0014931 | 005.8 COM. 6 | BUML23111925 | 02/23/2021 | 6 | 02/23/2021 | Book Open Access | |||||
Dewey Decimal Classification | Engineering Library | Engineering Library | 02/23/2021 | Donation | 0014932 | 005.8 COM. 7 | BUML23111932 | 02/23/2021 | 7 | 02/23/2021 | Book Open Access |