Jump to ratings and reviews
Rate this book

Computer & Internet Security: A Hands-on Approach

Rate this book
This book is based on the author's 18 years of teaching and research experience. It covers the fundamental principles in Computer and Internet security, including software security, hardware security, network security, web security, and cryptography. Its goal is to help readers understand how various attacks work, what their fundamental causes are, how to defend against them, and how various defense mechanisms work. The book can be used as a textbook for undergraduate and graduate courses. Over 80 universities and colleges adopted the first edition of this book within the first 15 months since it was published in late 2017. The author strongly believes in " learning by doing ", so the book takes a hands-on approach. For each security principle, the book uses a series of hands-on activities to help explain the principle; readers can touch, play with, and experiment with the principle, instead of just reading about it. For instance, if a security principle involves an attack, the book guides readers to actually launch the attack (in a contained environment). In some cases, if a principle involves a security mechanism, such as firewall or Virtual Private Network (VPN), the book guides readers to implement a mini-version of such a mechanism (e.g., mini-firewall or mini-VPN). Readers can learn better from such hands-on activities. The hands-on activities are based on the author's widely adopted SEED Labs, which have been used by over 1000 institutes in more than 65 countries .

688 pages, Hardcover

Published May 1, 2019

5 people are currently reading
52 people want to read

About the author

Wenliang Du

7 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
4 (40%)
4 stars
2 (20%)
3 stars
3 (30%)
2 stars
0 (0%)
1 star
1 (10%)
Displaying 1 - 2 of 2 reviews
Profile Image for Mick Petzold.
24 reviews
October 19, 2022
This book is very good. I appreciate the in-depth detail provided, showing how computer attacks work, and the use of virtual machines to actually perform the attacks ourselves. I especially enjoyed the Reverse Shell chapter having performed this myself without a good understanding of how it actually works. The book takes great effort in explaining how and why it works when setting up a backdoor using this approach.
Displaying 1 - 2 of 2 reviews

Can't find what you're looking for?

Get help and learn more about the design.