Cross Oceans Free with $50+ Orders
Menu
Computer Security: A Hands-on Approach - Practical Cybersecurity Guide for IT Professionals & Students | Network Protection, Ethical Hacking & Data Privacy Solutions | Perfect for Home Office & Enterprise Security
$18.59
$33.8
Safe 45%
Computer Security: A Hands-on Approach - Practical Cybersecurity Guide for IT Professionals & Students | Network Protection, Ethical Hacking & Data Privacy Solutions | Perfect for Home Office & Enterprise Security Computer Security: A Hands-on Approach - Practical Cybersecurity Guide for IT Professionals & Students | Network Protection, Ethical Hacking & Data Privacy Solutions | Perfect for Home Office & Enterprise Security
Computer Security: A Hands-on Approach - Practical Cybersecurity Guide for IT Professionals & Students | Network Protection, Ethical Hacking & Data Privacy Solutions | Perfect for Home Office & Enterprise Security
Computer Security: A Hands-on Approach - Practical Cybersecurity Guide for IT Professionals & Students | Network Protection, Ethical Hacking & Data Privacy Solutions | Perfect for Home Office & Enterprise Security
Computer Security: A Hands-on Approach - Practical Cybersecurity Guide for IT Professionals & Students | Network Protection, Ethical Hacking & Data Privacy Solutions | Perfect for Home Office & Enterprise Security
$18.59
$33.8
45% Off
Quantity:
Delivery & Return: Free shipping on all orders over $50
Estimated Delivery: 10-15 days international
14 people viewing this product right now!
SKU: 73051274
Guranteed safe checkout
amex
paypal
discover
mastercard
visa
apple pay
shop
Description
This book is for students, computer scientists, computer engineers, programmers, software developers, network and system administrators, and others who want to learn the principles of computer security and understand how various security attacks and countermeasures work. Equipped with the knowledge from this book, readers will be able to design and implement software systems and applications that are secure against attacks. They will also be able to evaluate the risks faced by computer and network systems, detect common vulnerabilities in software, use proper methods to protect their systems and networks, and more importantly, apply the learned security principles to solve real-world problems.The author strongly believes in "learning by doing", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). If a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-firewall or mini-VPN. Readers can learn better from such hands-on activities.All the hands-on activities are conducted in a virtual machine image provided by the author. They can be downloaded from this URL: http://www.cis.syr.edu/~wedu/seed/. Everything needed for the activities have already been set up; readers just need to download the VM (free), launch it using VirtualBox, and they can immediately work on the activities covered in the book. This book is based on the Ubuntu12.04 VM image. The author will regularly upgrade the VM image in every few years.Most of the activities in the book are based on the author's SEED labs, which are widely used by instructors all over the world. These labs are the results of 15 years' research, development, and testing efforts conducted by the author and his students in a project called SEED, which has been funded by the National Science Foundation since 2002.
More
Shipping & Returns

For all orders exceeding a value of 100USD shipping is offered for free.

Returns will be accepted for up to 10 days of Customer’s receipt or tracking number on unworn items. You, as a Customer, are obliged to inform us via email before you return the item.

Otherwise, standard shipping charges apply. Check out our delivery Terms & Conditions for more details.

Reviews
*****
Verified Buyer
5
Great book for learning many attacks that existed up to 2016. The vulnerabilities document within may still exist on some systems that haven't been updated (bad system admins). I surely don't encourage the reader to search for these vulnerable systems- but it is nice to know the book is fairly recent and not from a decade ago.The book is organized so that most chapters can be read independently- i.e. they don't necessarily build on one another, so you can hop around the chapters. Within each chapter, the author provides sufficient background that allows the user to understand how the hack is working. And he does it without losing the reader in noisy unnecessary details.Read the front matter- in it the author specifies the location of virtual machines for use in the hand-on exercises. To properly setup the VMs, you have to read his "how to" guide, posted on his site, for the exercises to work. I missed reading one of these, and could not get my VMs to network. I'm in a class and my professor pointed me to the location on the site- where the file was hidden in clear site (no reason why I missed it). No problem, just open the how-to, read it and configure your VM, and you're good to go. The configuration steps are not difficult... you just have to do them. The config takes about 10 min total.Some of the exercises use the linux command-line and C coding. Some exercises use command-line tools such as Netcat, Pcat, and Curl, which the author shows you how to use. Other exercises use a mock social website created by the author where he demonstrates how to steal the user's session id, and friend them without the other person's knowledge. Many attacks show you how to get root.This book is awesome, I don't know why more people have not bought/rated it. It is relevant, easy to read, concise, and teaches hacks in simple terms. I'm no programming expert (I come from the world of Basic, Fortran, Pascal and some C), yet I could follow this text.Prerequisites includes some knowledge of C or Java. Access to a virtual machine is a must (VMware or VirtualBox or equivalent). And multiple monitors (or a single large one) are VERY useful... since many times you will be running as many as 3 VMs (an attacker, a server, and a user).Happy hacking!!!

You Might Also Like