9781733003964-1733003967-Internet Security: A Hands-on Approach (Computer & Internet Security)

Internet Security: A Hands-on Approach (Computer & Internet Security)

ISBN-13: 9781733003964
ISBN-10: 1733003967
Edition: 3rd ed.
Author: Wenliang Du
Publication date: 2022
Publisher: Wenliang Du
Format: Paperback 701 pages
FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $16.13 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $47.44 USD
Buy

From $47.44

Rent

From $16.13

Book details

ISBN-13: 9781733003964
ISBN-10: 1733003967
Edition: 3rd ed.
Author: Wenliang Du
Publication date: 2022
Publisher: Wenliang Du
Format: Paperback 701 pages

Summary

Internet Security: A Hands-on Approach (Computer & Internet Security) (ISBN-13: 9781733003964 and ISBN-10: 1733003967), written by authors Wenliang Du, was published by Wenliang Du in 2022. With an overall rating of 3.7 stars, it's a notable title among other Network Security (Security & Encryption, Hacking, Encryption, Cryptography, Networking & Cloud Computing) books. You can easily purchase or rent Internet Security: A Hands-on Approach (Computer & Internet Security) (Paperback) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $24.59.

Description

Teaching Internet security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds on the author’s long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.
Topics covered in the book
- Attacks on TCP/IP and DNS protocols
- Packet sniffing and spoofing
- Firewall and Virtual Private Network (VPN)
- Border Gateway Protocol (BGP) and attacks
- Attacks on web applications, countermeasures
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure and Transport Layer Security
- Bitcoin and Blockchain
- Common hacking and defense mechanisms

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book