Tipo: materialTypeLabelLibro - General
Ubicación Física: 005.8 / D812 2017

Computer & internet security : a hands on approach /

Autor: Du, Wenliang.
Pié de imprenta: London : Wenliang Du, 2019.
Edición: Second edition.
Descripción: 657 páginas ; ilustraciones ; 19 x 23 cm.
ISBN: 9781733003933.
Tema(s):
Contenido: I. Software security. 1. Set-UID programs. 2. Environment variables and attacks. 3. Shellshock attack. 4. Buffer overflow attack. 5. Return-to-libe attack and ROP. 6. Format string vulnerability. 7. Race condition vulnerability. 8. Dirty cow. 9. Reverse shell. II. Web security. 10. Cross site request forgery. 11. Cross-site scripting attack. 12. SQL injection attack. III. Hardware security. 13. Meltdown attack. 14. Spectre attack. IV. Network security. 15. Packet sniffing and spoofing. 16. Attacks on the TCP protocol. 17. Firewall. 18. Domain name system (DNS) and attacks. 19. Virtual private network. 20. The heartbleed bug and attack. V. Cryptography. 21. Secret-key encryption. 22. One-way hash function. 23. Public key cryptography. 24. Public key infrastructure. 25. Transport layer security. 26. Bitcoin and blockchain.
Resumen: Unique among computer security texts, the Second Edition of the Computer & Internet Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries. Topics covered in the book. Software security: attacks and countermeasures. Web security: attacks and countermeasures. Network security: attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and Virtual Private Network (VPN). Newly discovered attacks, including Meltdown and Spectre attacks on CPUs. Dirty COW, Shellshock, Heartbleed, Hash collision, etc. Common hacking and defense techniques. Cryptography, PKI, and TLS programming. Bitcoin and Blockchain. (Tomado de la fuente).

List(s) this item appears in: Adquisiciones Ingeniería de Sistemas 2017-
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Copy number Status Date due Barcode
Libro - General Libro - General Sede Cra 13
CYP
Colección General 005.8/D812/2019 (Browse shelf) Ej. 1 En Sótano - Bodega (Acceso restringido) 65665

I. Software security. 1. Set-UID programs. 2. Environment variables and attacks. 3. Shellshock attack. 4. Buffer overflow attack. 5. Return-to-libe attack and ROP. 6. Format string vulnerability. 7. Race condition vulnerability. 8. Dirty cow. 9. Reverse shell. II. Web security. 10. Cross site request forgery. 11. Cross-site scripting attack. 12. SQL injection attack. III. Hardware security. 13. Meltdown attack. 14. Spectre attack. IV. Network security. 15. Packet sniffing and spoofing. 16. Attacks on the TCP protocol. 17. Firewall. 18. Domain name system (DNS) and attacks. 19. Virtual private network. 20. The heartbleed bug and attack. V. Cryptography. 21. Secret-key encryption. 22. One-way hash function. 23. Public key cryptography. 24. Public key infrastructure. 25. Transport layer security. 26. Bitcoin and blockchain.

Sistemas

Unique among computer security texts, the Second Edition of the Computer & Internet Security: A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries. Topics covered in the book. Software security: attacks and countermeasures. Web security: attacks and countermeasures. Network security: attacks on TCP/IP and DNS. Packet sniffing and spoofing. Firewall and Virtual Private Network (VPN). Newly discovered attacks, including Meltdown and Spectre attacks on CPUs. Dirty COW, Shellshock, Heartbleed, Hash collision, etc. Common hacking and defense techniques. Cryptography, PKI, and TLS programming. Bitcoin and Blockchain. (Tomado de la fuente).

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Universidad Católica de Colombia
La Universidad Católica de Colombia es una Institución de Educación Superior sujeta a inspección y vigilancia por el Ministerio de Educación, reconocida mediante Resolución Número 2271 de julio 7 de 1970 del Ministerio de Justicia.
Universidad Católica de Colombia © Copyright 2017
Universidad Católica de Colombia • PBX: (57 1) 3 27 73 00 - (57 1) 3 27 73 33
Bogotá, Avenida Caracas # 46 -72, sede Las Torres • Bogotá, Carrera 13 # 47 – 30, Sede 4​ • Bogotá, Diagonal 46 A # 15 B – 10, sede El Claustro
Bogotá, Carrera 13 # 47 – 49, sede Carrera 13