Learning Resource and Development
Amazon cover image
Image from Amazon.com
Image from Coce

Computer & internet security : a hands-on approach / Wenliang Du.

By: Material type: TextTextPublisher: [Place of Publication not identified] : [Name of Publisher not identified], 2019Edition: Second editionDescription: xxx, 657 pages ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781733003933
Other title:
  • Computer and internet security : a hands-on approach
Subject(s): DDC classification:
  • 005.8  D85c
LOC classification:
  • QA76.9.A25 D8 2019
Contents:
I. Software security -- Set-UID programs -- Environment variables and attacks -- Shellshock attack -- Buffer overflow attack -- Return-to-libc attack and ROP -- Format string vulnerability -- Race condition vulnerability -- Dirty COW -- Reverse shell -- II. Web security -- Cross site request forgery -- Cross-site scripting attack -- SQL injection attack -- III. Hardware security -- Meltdown attack -- Spectre attack -- IV. Network security -- Packet sniffling and spoofing -- Attacks on the TCP protocol -- Firewall -- Domain name system (DNS) and attacks -- Virtual private network -- The heartbleed bug and attack -- V. Cryptography -- Secret-key encryption -- One-way hash function -- Public key cryptography -- Public key infrastructure -- Transport layer security -- Bitcoin and blockchain.
Summary: "Readers can learn how computer attacks really work, understand their fundamental causes and defense, and try these attacks themselves on the virtual machines provided by the author. The book is based on the SEED labs developed by the author. These labs are hands-on experiments and exercises that have been used by over 1000 universities, colleges, and high schools worldwide. SEED labs are free for educational use."
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
Books Books Main Library Graduate School Library GRD 005.8 D85c 2019 (Browse shelf(Opens below)) 1-1 Available 030315

Includes bibliographical references.

I. Software security -- Set-UID programs -- Environment variables and attacks -- Shellshock attack -- Buffer overflow attack -- Return-to-libc attack and ROP -- Format string vulnerability -- Race condition vulnerability -- Dirty COW -- Reverse shell -- II. Web security -- Cross site request forgery -- Cross-site scripting attack -- SQL injection attack -- III. Hardware security -- Meltdown attack -- Spectre attack -- IV. Network security -- Packet sniffling and spoofing -- Attacks on the TCP protocol -- Firewall -- Domain name system (DNS) and attacks -- Virtual private network -- The heartbleed bug and attack -- V. Cryptography -- Secret-key encryption -- One-way hash function -- Public key cryptography -- Public key infrastructure -- Transport layer security -- Bitcoin and blockchain.

"Readers can learn how computer attacks really work, understand their fundamental causes and defense, and try these attacks themselves on the virtual machines provided by the author. The book is based on the SEED labs developed by the author. These labs are hands-on experiments and exercises that have been used by over 1000 universities, colleges, and high schools worldwide. SEED labs are free for educational use."

There are no comments on this title.

to post a comment.