Jump to ratings and reviews
Rate this book

Computer & Internet Security: A Hands-on Approach

Rate this book
Teaching computer and network security principles via hands-on activities
Unique among computer security texts, the Second Edition of the Computer & Internet A Hands-on Approach builds on the author’s long tradition of teaching this complex subject through a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can "touch", play with, and experiment with the principle, instead of just reading about it. The hands-on activities are based on the author's widely adopted SEED Labs , which have been used by over 1000 institutes in more than 65 countries.

Topics covered in the book
- Software attacks and countermeasures
- Web attacks and countermeasures
- Network attacks on TCP/IP and DNS
- Packet sniffing and spoofing
- Firewall and Virtual Private Network (VPN)
- Newly discovered attacks, including Meltdown and Spectre attacks on CPUs, Dirty COW, Shellshock, Heartbleed, Hash collision, etc.
- Common hacking and defense techniques
- Cryptography, PKI, and TLS programming
- Bitcoin and Blockchain

687 pages, Paperback

Published May 1, 2019

5 people are currently reading
52 people want to read

About the author

Wenliang Du

7 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
4 (36%)
4 stars
2 (18%)
3 stars
3 (27%)
2 stars
1 (9%)
1 star
1 (9%)
Displaying 1 - 2 of 2 reviews
Profile Image for Mick Petzold.
24 reviews
October 19, 2022
This book is very good. I appreciate the in-depth detail provided, showing how computer attacks work, and the use of virtual machines to actually perform the attacks ourselves. I especially enjoyed the Reverse Shell chapter having performed this myself without a good understanding of how it actually works. The book takes great effort in explaining how and why it works when setting up a backdoor using this approach.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.