Teaching computer security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds on the author's long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.
Topics covered in the book
- Software vulnerabilities, attacks, and countermeasures
- Attacks on web applications, countermeasures
- Attacks on hardware: Meltdown and Spectre attacks
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure (PKI)
- Common hacking and defense techniques
Teaching computer and network security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds on the author's long tradition of teaching complex subjects through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle. Readers can touch, play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes worldwide. The author has also published online courses on Udemy based on this book.
Topics covered in the book
- Software security: attacks and countermeasures
- Web security: attacks and countermeasures
- Hardware security: Meltdown and Spectre attacks
- Network security: attacks on TCP/IP and DNS
- Firewall and Virtual Private Network (VPN)
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure
- Common hacking and defense techniques
Teaching Internet security principles via hands-on activities
Unique among computer security texts, this book, in its third edition, builds
on the author's long tradition of teaching complex subjects through a hands-on
approach. For each security principle, the book uses a series of hands-on
activities to help explain the principle. Readers can touch, play with, and
experiment with the principle, instead of just reading about it. The hands-on
activities are based on the author's widely adopted SEED Labs, which have been
used by over 1000 institutes worldwide. The author has also published online
courses on Udemy based on this book.
Topics covered in the book
- Attacks on TCP/IP and DNS protocols
- Packet sniffing and spoofing
- Firewall and Virtual Private Network (VPN)
- Border Gateway Protocol (BGP) and attacks
- Attacks on web applications, countermeasures
- Cryptography and attacks on algorithms and protocols
- Public Key Infrastructure and Transport Layer Security
- Bitcoin and Blockchain
- Common hacking and defense mechanisms
This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer and Internet security, including software security, hardware security, network security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses. Over 80 universities and colleges adopted the first edition of this book within the first 15 months since it was published in late 2017.
The author strongly believes in learning by doing, so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). In some cases, if a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-version of such a mechanism (e.g., mini-firewall or mini-VPN). Readers can learn better from such hands-on activities.
The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.
This book is a part of another book titled Computer & Internet Security: A Hands-on Approach, 2nd Edition (687 pages). It is created to lower the cost on students, as many courses only need this part. It covers 16 of the 26 chapters.
This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Internet security, including network security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses.
The author strongly believes in learning by doing, so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). In some cases, if a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-version of such a mechanism (e.g., mini-firewall or mini-VPN). Readers can learn better from such hands-on activities.
The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.
This book is a part of another book titled Computer & Internet Security: A Hands-on Approach, 2nd Edition (687 pages). It is created to lower the cost on students, as many courses only need this part. It covers 17 of the 26 chapters.
This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer Security, including software security, hardware security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses.
The author strongly believes in learning by doing, so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). Readers can learn better from such hands-on activities.
The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.
This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer and Internet security, including software security, hardware security, network security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses. Over 80 universities and colleges adopted the first edition of this book within the first 15 months since it was published in late 2017.
The author strongly believes in learning by doing, so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). In some cases, if a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-version of such a mechanism (e.g., mini-firewall or mini-VPN). Readers can learn better from such hands-on activities.
The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries.