Computer security lab manual / Vincent J. Nestler ... [et al.].
Series: Information assurance & security seriesPublication details: Boston : McGraw-Hill Irwin, c2006.Description: xix, 759 p. : ill. ; 24 cmISBN:- 97800722550809
- 0072255080 (alk. paper)
- 005.8 22 COM.
Item type | Current library | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|
Book Open Access | Engineering Library | 005.8 COM. 1 (Browse shelf(Opens below)) | 1 | Available | BUML23111930 | |
Book Open Access | Engineering Library | 005.8 COM.2 (Browse shelf(Opens below)) | 2 | Available | BUML23111915 | |
Book Open Access | Engineering Library | 005.8 COM. 3 (Browse shelf(Opens below)) | 3 | Available | BUML23111928 | |
Book Open Access | Engineering Library | 005.8 COM.4 (Browse shelf(Opens below)) | 4 | Available | BUML23111922 | |
Book Open Access | Engineering Library | 005.8 COM.5 (Browse shelf(Opens below)) | 5 | Available | BUML23111924 | |
Book Open Access | Engineering Library | 005.8 COM. 6 (Browse shelf(Opens below)) | 6 | Available | BUML23111925 | |
Book Open Access | Engineering Library | 005.8 COM. 7 (Browse shelf(Opens below)) | 7 | Available | BUML23111932 |
Table of Content
SECTION 1 NETWORKING BASICS: HOW DO NETWORKS WORK?
Chapter 1 WORKSTATION NETWORK CONFIGURATION AND CONNECTIVITY
Lab1: Network workstation client configuration
Lab2: Computer name resolution
Lab3: Network routing basics
Lab4: Network communication analysis
Chapter 2 TCP/UDP BASICS
Lab5: TCP basics
Lab6: UDP basics
Chapter 3 NETWORK APPLICATIONS
Lab7: FTP communication
Lab8: Port connection status
Lab9: E-mail protocols_SMTP and POP
Lab10: E-mail client software
SECTION 2 VULNERABILITIES AND THREATS _ HOW CAN NETWORKS BE COMPROMISED?
Chapter 4 SCANNING AND ENUMERATING THE NETWORK FOR TARGETS
Lab12: IP address and port scanning, service identity determination
Lab14: GUI-Based vulnerability scanners
Chapter 5 ATTACKS - WEB SERVER, E-MAIL,DOS, AND TROJAN ATTACKS
Lab15: Web server exploits
Lab16: E-mail system exploits
Lab17: Denial of service exploits
Lab18: Trojan attacks
Chapter 6 ESCALATING PRIVILEGE- SNIFFING, KEY LOGGING, PASSWORD-CRACKING ATTACKS
Lab19: Intercepting and sniffing network traffic
Lab20: Keystroke logging
Lab21: Password cracking
Lab22: Man-in-the-middle attack
etc.
SECTION 3 REVENTION-HOW DO WE PREVENT HARM TO NETWORKS?
Chapter 7 HARDENING THE HOST COMPUTER
Lab24: Hardening the operating system
Lab25: Windows XP service pack 2
Lab26: Using anti-virus applications
Lab27: Using firewalls
Chapter 8 SECURING NETWORK COMMUNICATIONS
Lab28: Using GPG to encrypt and sign e-mail
Lab29: using secure shell
Lab30: using secure copy
Lab31: Using certificates and SSL
etc.
SECTION 4 DETECTION AND RESPONSE-HOW DO WE DETECT AND RESPOND TO ATTACKS?
Chapter 9 PREPARING FOR AND DETECTING ATTACKS
Lab33: System log file analysis
Lab34: Intrusion detection systems
Lab35: Using honeypots
Lab36: Detecting spyware
Chapter 10 DIGITAL FORENSICS
Lab 38: Initial Response--Incident Determination
Lab 39: Acquiring the Data
Lab 40: Forensic Analysis
Index : p. 741 - 759
There are no comments on this title.