Programming Books C Java PHP Python Learn more Browse Programming Books
Build Your Own Security Lab and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $50.00
  • Save: $15.79 (32%)
FREE Shipping on orders over $35.
Only 8 left in stock (more on the way).
Ships from and sold by Amazon.com.
Gift-wrap available.
FREE Shipping on orders over $35.
Condition: Used: Good
Comment: *NO CD* Cover has light shelf wear, pages are clean and unmarked. Stored and shipped by Amazon. Trusted Seller. 100% Satisfaction or your money back guarantee!
Access codes and supplements are not guaranteed with used items.
Trade in your item
Get a $2.00
Gift Card.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See all 2 images

Build Your Own Security Lab: A Field Guide for Network Testing Paperback – April 28, 2008

ISBN-13: 978-0470179864 ISBN-10: 0470179864 Edition: 1st

Buy New
Price: $34.21
40 New from $11.42 19 Used from $11.29
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$34.21
$11.42 $11.29
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Frequently Bought Together

Build Your Own Security Lab: A Field Guide for Network Testing + Metasploit: The Penetration Tester's Guide
Price for both: $64.94

Buy the selected items together

NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 456 pages
  • Publisher: Wiley; 1 edition (April 28, 2008)
  • Language: English
  • ISBN-10: 0470179864
  • ISBN-13: 978-0470179864
  • Product Dimensions: 9.1 x 7.5 x 1.2 inches
  • Shipping Weight: 1.4 pounds (View shipping rates and policies)
  • Average Customer Review: 4.5 out of 5 stars  See all reviews (11 customer reviews)
  • Amazon Best Sellers Rank: #765,973 in Books (See Top 100 in Books)

Editorial Reviews

From the Back Cover

Many books tell you what to do. This one tells you how.

If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.

  • Collect the necessary hardware and software and assemble your own network lab

  • Configure a bootable Linux CD

  • Explore various methods for gathering information about existing security

  • Identify automated attack and penetration tools

  • Understand cryptographic systems and encryption and authentication attacks

  • Learn to find, identify, and defeat malware

  • Address the special protection needs of wireless systems

  • Use Snort® to build an IDS that will help to detect and identify attacks in real time

DVD includes tools for actually building and implementing security solutions

  • Open source tools

  • Demo software

  • A bootable version of Linux

About the Author

Michael Gregg, CISSP, CISA, MCSE, holds a total of 19 professional certifications and is a highly respected security consultant. President of Security Solutions, Inc., he is also an expert for three TechTarget.com web sites. Michael has authored or coauthored several books, including Security+ Street Smarts, also published by Wiley.

More About the Author

Michael Gregg is COO of Superior Solutions, Inc. (www.thesolutionfirm.com), a Houston based information security assessment, penetration testing, and IT security training firm. Mr. Gregg is responsible for helping corporations establish and validate enterprise wide information security programs and controls. He is an expert on cyber security, networking, and Internet technologies.

While consulting consumes a large amount of Michael's time, he has contributed to more than 10 books and has spoken at security, technology, and educational conferences such as ISC2's Security Leadership Conference, Hacker Halted, Government Technology Conference (GTC), National Credit Union Administration (NCUA) IT Conference, and The American College of Forensic Examiners.

Michael has appeared in numerous media outlets including The New York Times, Fox News, Canadian News (BNN), Kiplinger as well as NPR, ESPN, and other major networks. He holds two associate's degrees, a bachelor's degree, and a master's degree. He presently maintains many certifications including CISSP, CISA, CISM, etc.

Customer Reviews

4.5 out of 5 stars
5 star
6
4 star
4
3 star
1
2 star
0
1 star
0
See all 11 customer reviews
This is a good book for people starting out in network security.
John Gardener
I've done nearly everything in this book on my own, and that's really the only problem with it.
A. Johnson
Nonetheless, the author does a great job presenting information to the reader.
Dan from DC

Most Helpful Customer Reviews

27 of 31 people found the following review helpful By A. Johnson on November 17, 2008
Format: Paperback
I'll be completely honest. I went through this in about two hours, and I plan on returning it. It simply didn't have anything new for me. I was expecting it to be more along the lines of setting up a virtual network, attempting to hack the VMs, and then checking the procedures to see if you did it right.

Instead, this book covers things like how to install OSes into VMs, gives basic overviews of tools, etc. However, this is a great book if you're at the appropriate level for it. I think this makes a good follow-up to CompTIA's Security+ certification. It'll help novices get their feet wet with actual hands-on activities. I've done nearly everything in this book on my own, and that's really the only problem with it. While I didn't pay a great deal of attention to every bit of text, it seemed to be technically accurate and free from errors.

I wish I could give a more detailed review, but I thought I'd at least post this since no one has reviewed it yet. Just take your skill level into account when considering this title. If you want more advanced books, check out the Hacking Exposed series, Grey Hat Hacking, and the Penetration Tester's Open Source Toolkit.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
15 of 17 people found the following review helpful By Jesse G. Lands on July 11, 2009
Format: Paperback
"Build your own Security Lab A field guide for network testing" is great at what it is intended to be: an introduction for a novice security person in what they should be working on to get experience in the field. I have Michael Gregg's Certified Ethical Hacker and in most terms I would say this book is more of a work book for the study guide. It gives you a feel for what equipment you will need and how the equipment should be connected, but doesn't go to in-depth into the nuts and bolts of it.
The book includes a copy of BackTrack and a few other tools on the DVD and these items help the novice have an idea of what tools they should be looking for on the Internet, but a better idea may be to have a central repository for the tools or include the link to the tools since most of the tools were outdated by the time the book was published.
Almost every chapter or in some cases a group of chapters could be written as a stand-alone book. The author did an excellent job of summarizing some of the areas and others I felt he could have covered in more detail.
It would have been nice to see more information on sniffers and packet analyzing. The book was labeled "field guide for network testing", but there was only a page dedicated to Wireshark. A big part of network security is analyzing the traffic that is crossing the network. The author covers some of it under Intrusion Detection, but again it is not sufficient in my opinion.
I was a little surprised by the lack of anything more than a mention of Netcat. With the value of this tool and the wide spread use of variants of the tool I would have expected a page at least of the use of the software and how it is distributed.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 7 people found the following review helpful By Amazon Customer on November 1, 2009
Format: Paperback Verified Purchase
After taking several classes in the local Jr College to study for my CCNA, I came to realize that I was not interested in going down the CISCO certification path. So I started looking at other certifications and decided to work towards a CEH and LPT certification. After my experience with the CISCO classes, I understood that I would either have to rent time through a web lab or create my own. This book that I found that followed my mine set of build it on a shoe string and expand as your needs require. This book is great for me because the author introduces the subject in a way I can pick it up from the book and do the hands on stuff with having to already know the subject or have a reference source to go to for questions.

If you already know the subject matter, than pass this book on by for a more advanced book. If like me, you are in IT and expanding your knowledge, then this is a great book.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
2 of 2 people found the following review helpful By TTAllen on January 24, 2011
Format: Paperback Verified Purchase
I am only about half way through digesting this book but it is clear to me that the orientation for a beginner is helpful. We learn the terminology and the history. We also get concrete steps to take. I am hopeful that this book will help me to generate data within one more week.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 7 people found the following review helpful By Charles Tholen on February 5, 2009
Format: Paperback
The book is a solid foundation for information security practitioners or those wanting to move into the field. The author gives the reader enough to get a lab built and plenty of activities to preform in the lab. Seasoned security professionals probably already know most of what is in the book but may pick up a few new tools.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback Verified Purchase
I wouldn't pay for this new, I would buy this used at this point.......... add it to your security library but don't count on anything cutting edge. This is a foundation book at this point.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

What Other Items Do Customers Buy After Viewing This Item?