Computer security lab manual / Vincent J. Nestler ... [et al.].

Contributor(s): Series: Information assurance & security seriesPublication details: Boston : McGraw-Hill Irwin, c2006.Description: xix, 759 p. : ill. ; 24 cmISBN:
  • 97800722550809
  • 0072255080 (alk. paper)
Subject(s): DDC classification:
  • 005.8 22 COM.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Open Access Book Open Access Engineering Library 005.8 COM. 1 (Browse shelf(Opens below)) 1 Available BUML23111930
Book Open Access Book Open Access Engineering Library 005.8 COM.2 (Browse shelf(Opens below)) 2 Available BUML23111915
Book Open Access Book Open Access Engineering Library 005.8 COM. 3 (Browse shelf(Opens below)) 3 Available BUML23111928
Book Open Access Book Open Access Engineering Library 005.8 COM.4 (Browse shelf(Opens below)) 4 Available BUML23111922
Book Open Access Book Open Access Engineering Library 005.8 COM.5 (Browse shelf(Opens below)) 5 Available BUML23111924
Book Open Access Book Open Access Engineering Library 005.8 COM. 6 (Browse shelf(Opens below)) 6 Available BUML23111925
Book Open Access Book Open Access Engineering Library 005.8 COM. 7 (Browse shelf(Opens below)) 7 Available BUML23111932

Table of Content
SECTION 1 NETWORKING BASICS: HOW DO NETWORKS WORK?
Chapter 1 WORKSTATION NETWORK CONFIGURATION AND CONNECTIVITY
Lab1: Network workstation client configuration
Lab2: Computer name resolution
Lab3: Network routing basics
Lab4: Network communication analysis

Chapter 2 TCP/UDP BASICS
Lab5: TCP basics
Lab6: UDP basics

Chapter 3 NETWORK APPLICATIONS
Lab7: FTP communication
Lab8: Port connection status
Lab9: E-mail protocols_SMTP and POP
Lab10: E-mail client software

SECTION 2 VULNERABILITIES AND THREATS _ HOW CAN NETWORKS BE COMPROMISED?
Chapter 4 SCANNING AND ENUMERATING THE NETWORK FOR TARGETS
Lab12: IP address and port scanning, service identity determination
Lab14: GUI-Based vulnerability scanners

Chapter 5 ATTACKS - WEB SERVER, E-MAIL,DOS, AND TROJAN ATTACKS
Lab15: Web server exploits
Lab16: E-mail system exploits
Lab17: Denial of service exploits
Lab18: Trojan attacks

Chapter 6 ESCALATING PRIVILEGE- SNIFFING, KEY LOGGING, PASSWORD-CRACKING ATTACKS
Lab19: Intercepting and sniffing network traffic
Lab20: Keystroke logging
Lab21: Password cracking
Lab22: Man-in-the-middle attack
etc.

SECTION 3 REVENTION-HOW DO WE PREVENT HARM TO NETWORKS?
Chapter 7 HARDENING THE HOST COMPUTER
Lab24: Hardening the operating system
Lab25: Windows XP service pack 2
Lab26: Using anti-virus applications
Lab27: Using firewalls

Chapter 8 SECURING NETWORK COMMUNICATIONS
Lab28: Using GPG to encrypt and sign e-mail
Lab29: using secure shell
Lab30: using secure copy
Lab31: Using certificates and SSL
etc.

SECTION 4 DETECTION AND RESPONSE-HOW DO WE DETECT AND RESPOND TO ATTACKS?
Chapter 9 PREPARING FOR AND DETECTING ATTACKS
Lab33: System log file analysis
Lab34: Intrusion detection systems
Lab35: Using honeypots
Lab36: Detecting spyware

Chapter 10 DIGITAL FORENSICS
Lab 38: Initial Response--Incident Determination
Lab 39: Acquiring the Data
Lab 40: Forensic Analysis

Index : p. 741 - 759

There are no comments on this title.

to post a comment.