9781733003919-1733003916-Internet Security: A Hands-on Approach

Internet Security: A Hands-on Approach

ISBN-13: 9781733003919
ISBN-10: 1733003916
Edition: 2nd ed.
Author: Wenliang Du
Publication date: 2019
Publisher: Wenliang Du
Format: Paperback 455 pages
FREE US shipping
Buy

From $41.80

Book details

ISBN-13: 9781733003919
ISBN-10: 1733003916
Edition: 2nd ed.
Author: Wenliang Du
Publication date: 2019
Publisher: Wenliang Du
Format: Paperback 455 pages

Summary

Internet Security: A Hands-on Approach (ISBN-13: 9781733003919 and ISBN-10: 1733003916), written by authors Wenliang Du, was published by Wenliang Du in 2019. With an overall rating of 4.4 stars, it's a notable title among other Network Security (Security & Encryption, Hacking, Encryption, Cryptography, Digital Currencies, History & Culture, Networking & Cloud Computing) books. You can easily purchase or rent Internet Security: A Hands-on Approach (Paperback) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $13.93.

Description

This book is a part of another book titled "Computer & Internet Security: A Hands-on Approach, 2nd Edition" (687 pages). It is created to lower the cost on students, as many courses only need this part. It covers 16 of the 26 chapters.

Teaching Internet security principles via hands-on activities
Unique among computer security texts, the Second Edition of the Internet Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.

Topics covered in the book
- Attacks on TCP/IP Protocols and DNS
- Packet sniffing and spoofing
- Firewall, Virtual Private Network (VPN)
- Cryptography, PKI, and TLS Programming
- Bitcoin and Blockchain
- Attacks on Web Applications
- Common Hacking and Defense Mechanisms
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book