counter Computer Security: A Hands-On Approach - Free Download Books
Hot Best Seller

Computer Security: A Hands-On Approach

Availability: Ready to download

This book is for students, computer scientists, computer engineers, programmers, software developers, network and system administrators, and others who want to learn the principles of computer security and understand how various security attacks and countermeasures work. Equipped with the knowledge from this book, readers will be able to design and implement software syste This book is for students, computer scientists, computer engineers, programmers, software developers, network and system administrators, and others who want to learn the principles of computer security and understand how various security attacks and countermeasures work. Equipped with the knowledge from this book, readers will be able to design and implement software systems and applications that are secure against attacks. They will also be able to evaluate the risks faced by computer and network systems, detect common vulnerabilities in software, use proper methods to protect their systems and networks, and more importantly, apply the learned security principles to solve real-world problems. The author strongly believes in "learning by doing", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch," play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). If a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-firewall or mini-VPN. Readers can learn better from such hands-on activities. All the hands-on activities are conducted in a virtual machine image provided by the author. They can be downloaded from this URL: http: //www.cis.syr.edu/ wedu/seed/. Everything needed for the activities have already been set up; readers just need to download the VM (free), launch it using VirtualBox, and they can immediately work on the activities covered in the book. This book is based on the Ubuntu12.04 VM image. The author will regularly upgrade the VM image in every few years. Most of the activities in the book are based on the author's SEED labs, which are widely used by instructors all over the world. These labs are the results of 15 years' research, development, and testing efforts conducted by the author and his students in a project called SEED, which has been funded by the National Science Foundation since 2002.


Compare

This book is for students, computer scientists, computer engineers, programmers, software developers, network and system administrators, and others who want to learn the principles of computer security and understand how various security attacks and countermeasures work. Equipped with the knowledge from this book, readers will be able to design and implement software syste This book is for students, computer scientists, computer engineers, programmers, software developers, network and system administrators, and others who want to learn the principles of computer security and understand how various security attacks and countermeasures work. Equipped with the knowledge from this book, readers will be able to design and implement software systems and applications that are secure against attacks. They will also be able to evaluate the risks faced by computer and network systems, detect common vulnerabilities in software, use proper methods to protect their systems and networks, and more importantly, apply the learned security principles to solve real-world problems. The author strongly believes in "learning by doing", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch," play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). If a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-firewall or mini-VPN. Readers can learn better from such hands-on activities. All the hands-on activities are conducted in a virtual machine image provided by the author. They can be downloaded from this URL: http: //www.cis.syr.edu/ wedu/seed/. Everything needed for the activities have already been set up; readers just need to download the VM (free), launch it using VirtualBox, and they can immediately work on the activities covered in the book. This book is based on the Ubuntu12.04 VM image. The author will regularly upgrade the VM image in every few years. Most of the activities in the book are based on the author's SEED labs, which are widely used by instructors all over the world. These labs are the results of 15 years' research, development, and testing efforts conducted by the author and his students in a project called SEED, which has been funded by the National Science Foundation since 2002.

34 review for Computer Security: A Hands-On Approach

  1. 4 out of 5

    Bilal

    I picked up this text to educate myself on all topics around network security, and as such I read through Parts II and III, Web Security and Network Security. I found the text very clearly written containing all the necessary details to make it authentic and hands-on. The book is accessible and sufficiently in-depth to set oneself up for a basic understanding of computer security issues and their solutions, and for further in-depth study if intended. I expect to use the book as a reference to re I picked up this text to educate myself on all topics around network security, and as such I read through Parts II and III, Web Security and Network Security. I found the text very clearly written containing all the necessary details to make it authentic and hands-on. The book is accessible and sufficiently in-depth to set oneself up for a basic understanding of computer security issues and their solutions, and for further in-depth study if intended. I expect to use the book as a reference to refresh my memory as needed. Recommended without qualification!

  2. 5 out of 5

    SixAlien3

  3. 5 out of 5

    Douglas bond

  4. 4 out of 5

    Raymond Obinaju

  5. 5 out of 5

    Tarek Wehbe

  6. 5 out of 5

    Meng Jingsong

  7. 4 out of 5

    Zhanzheng

  8. 5 out of 5

    Amir

  9. 4 out of 5

    Xuzeyuanfred Xu

  10. 4 out of 5

    Aloha

  11. 4 out of 5

    Amaan Cheval

  12. 5 out of 5

    Dan Ragsdale

  13. 5 out of 5

    Ehsan Tadayon

  14. 5 out of 5

    Andrew

  15. 5 out of 5

    HeyRick07

  16. 4 out of 5

    Arnold Wentholt

  17. 5 out of 5

    vidocqdrake

  18. 4 out of 5

    Simone Dell'Orto

  19. 5 out of 5

    Gehor

  20. 4 out of 5

    Tuan

  21. 4 out of 5

    Menghan Bai

  22. 5 out of 5

    Robin Zhou

  23. 4 out of 5

    Justin K

  24. 4 out of 5

    Kaiqi Zhang

  25. 4 out of 5

    Eman Samkari

  26. 4 out of 5

    C Gilboy

  27. 5 out of 5

    אנה פרבר

  28. 4 out of 5

    Agus Winarno

  29. 5 out of 5

    Sivaa

  30. 5 out of 5

    Tanvir

  31. 4 out of 5

    Tingna Wang

  32. 5 out of 5

    João Andrade

  33. 4 out of 5

    Hoàng Long

  34. 4 out of 5

    Cindy Liu

Add a review

Your email address will not be published. Required fields are marked *

Loading...