Principles of Computer Security Lab Manual, Fourth Edition
Vincent J. Nestler, Keith Harrison, Matthew P. Hirsch, Wm. Arthur Conklin· ISBN 9780071836555
Special offer terms
Zookal Study Premium
Subscribe & save
By selecting the 'Susbcribe & Save' option you are enrolling in an auto-renewing subscription of Zookal Study Premium. Cancel at anytime.
Auto-Renewal
Your Zookal Study Premium subscription will be renewed each month until you cancel. You consent to Zookal automatically charging your payment method on file $19.99 each month after 1st month free period until you cancel.
How to Cancel
You can cancel your subscription anytime by visiting Manage account page, clicking "Manage subscription" and completing the steps to cancel. Cancellations take effect at the end of the 1st month free period (if applicable) or at the end of the current billing cycle in which your request to cancel was received. Subscription fees are not refundable.
Zookal Study Premium Monthly Subscription Includes:
Ability to post up to ten (10) questions per month.
20% off your textbooks order and free standard shipping whenever you shop online at
textbooks.zookal.com.au
Unused monthly subscription benefits have no cash value, are not transferable, and expire at the end of each month. This means that subscription benefits do not roll over to or accumulate for use in subsequent months.
Payment Methods
Afterpay and Zip Pay will not be available for purchases with Zookal Study Premium subscription added to bag.
$1.00 preauthorisation
You may see a $1.00 preauthorisation by your bank which will disappear from your statement in a few business days..
Email communications
By adding Zookal Study Premium, you agree to receive email communications from Zookal.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Practice the Computer Security Skills You Need to Succeed!
40+ lab exercises challenge you to solve problems based on realistic case studies
Step-by-step scenarios require you to think critically
Lab analysis tests measure your understanding of lab results
Key term quizzes help build your vocabulary
Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines
In this Lab Manual, you'll practice
Configuring workstation network connectivity
Analyzing network communication
Establishing secure network application communication using TCP/IP protocols
Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools
Defending against network application attacks, including SQL injection, web browser exploits, and email attacks
Combatting Trojans, man-in-the-middle attacks, and steganography
Hardening a host computer, using antivirus applications, and configuring firewalls
Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec
Preparing for and detecting attacks
Backing up and restoring data
Handling digital forensics and incident response
Instructor resources available:
This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately
Virtual machine files
Solutions to the labs are not included in the book and are only available to adopting instructors