Enter your mobile number or email address below and we'll send you a link to download the free Kindle App. Then you can start reading Kindle books on your smartphone, tablet, or computer - no Kindle device required.

  • Apple
  • Android
  • Windows Phone
  • Android

To get the free app, enter your mobile phone number.

Build Your Own Security Lab: A Field Guide for Network Testing 1st Edition

4.4 out of 5 stars 13 customer reviews
ISBN-13: 978-0470179864
ISBN-10: 0470179864
Why is ISBN important?
ISBN
This bar-code number lets you verify that you're getting exactly the right version or edition of a book. The 13-digit and 10-digit formats both work.
Scan an ISBN with your phone
Use the Amazon App to scan ISBNs and compare prices.
Have one to sell? Sell on Amazon
Buy used
$22.50
Condition: Used - Good
Condition: Used: Good
Comment: CD included! Clean copy with moderate cover wear and no writing or highlighting. Eligible for FREE Prime/Super Saver shipping! Ships directly from Amazon warehouses with hassle-free return. Please contact me directly for fast and friendly resolution of any issues before leaving feedback.
Access codes and supplements are not guaranteed with used items.
24 Used from $5.24
FREE Shipping on orders over $25.
More Buying Choices
14 New from $9.97 24 Used from $5.24
Free Two-Day Shipping for College Students with Prime Student Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


Excel2016ForDummiesVideo
Excel 2016 For Dummies Video Training
Discover what Excel can do for you with self-paced video lessons from For Dummies. Learn more.
click to open popover

Editorial Reviews

From the Back Cover

Many books tell you what to do. This one tells you how.

If your job is to design or implement IT security solutions, or if you're studying for any security certification, this is the how-to guide you've been looking for. Here's how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.

  • Collect the necessary hardware and software and assemble your own network lab

  • Configure a bootable Linux CD

  • Explore various methods for gathering information about existing security

  • Identify automated attack and penetration tools

  • Understand cryptographic systems and encryption and authentication attacks

  • Learn to find, identify, and defeat malware

  • Address the special protection needs of wireless systems

  • Use Snort® to build an IDS that will help to detect and identify attacks in real time

DVD includes tools for actually building and implementing security solutions

  • Open source tools

  • Demo software

  • A bootable version of Linux

About the Author

Michael Gregg, CISSP, CISA, MCSE, holds a total of 19 professional certifications and is a highly respected security consultant. President of Security Solutions, Inc., he is also an expert for three TechTarget.com web sites. Michael has authored or coauthored several books, including Security+ Street Smarts, also published by Wiley.
NO_CONTENT_IN_FEATURE

The latest book club pick from Oprah
"The Underground Railroad" by Colson Whitehead is a magnificent novel chronicling a young slave's adventures as she makes a desperate bid for freedom in the antebellum South. See more

Product Details

  • Paperback: 456 pages
  • Publisher: Wiley; 1 edition (April 28, 2008)
  • Language: English
  • ISBN-10: 0470179864
  • ISBN-13: 978-0470179864
  • Product Dimensions: 7.4 x 1 x 9.2 inches
  • Shipping Weight: 1.4 pounds
  • Average Customer Review: 4.4 out of 5 stars  See all reviews (13 customer reviews)
  • Amazon Best Sellers Rank: #955,978 in Books (See Top 100 in Books)

Customer Reviews

Top Customer Reviews

By A. Johnson on November 17, 2008
Format: Paperback
I'll be completely honest. I went through this in about two hours, and I plan on returning it. It simply didn't have anything new for me. I was expecting it to be more along the lines of setting up a virtual network, attempting to hack the VMs, and then checking the procedures to see if you did it right.

Instead, this book covers things like how to install OSes into VMs, gives basic overviews of tools, etc. However, this is a great book if you're at the appropriate level for it. I think this makes a good follow-up to CompTIA's Security+ certification. It'll help novices get their feet wet with actual hands-on activities. I've done nearly everything in this book on my own, and that's really the only problem with it. While I didn't pay a great deal of attention to every bit of text, it seemed to be technically accurate and free from errors.

I wish I could give a more detailed review, but I thought I'd at least post this since no one has reviewed it yet. Just take your skill level into account when considering this title. If you want more advanced books, check out the Hacking Exposed series, Grey Hat Hacking, and the Penetration Tester's Open Source Toolkit.
Comment 30 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
"Build your own Security Lab A field guide for network testing" is great at what it is intended to be: an introduction for a novice security person in what they should be working on to get experience in the field. I have Michael Gregg's Certified Ethical Hacker and in most terms I would say this book is more of a work book for the study guide. It gives you a feel for what equipment you will need and how the equipment should be connected, but doesn't go to in-depth into the nuts and bolts of it.
The book includes a copy of BackTrack and a few other tools on the DVD and these items help the novice have an idea of what tools they should be looking for on the Internet, but a better idea may be to have a central repository for the tools or include the link to the tools since most of the tools were outdated by the time the book was published.
Almost every chapter or in some cases a group of chapters could be written as a stand-alone book. The author did an excellent job of summarizing some of the areas and others I felt he could have covered in more detail.
It would have been nice to see more information on sniffers and packet analyzing. The book was labeled "field guide for network testing", but there was only a page dedicated to Wireshark. A big part of network security is analyzing the traffic that is crossing the network. The author covers some of it under Intrusion Detection, but again it is not sufficient in my opinion.
I was a little surprised by the lack of anything more than a mention of Netcat. With the value of this tool and the wide spread use of variants of the tool I would have expected a page at least of the use of the software and how it is distributed.
Read more ›
Comment 16 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
After taking several classes in the local Jr College to study for my CCNA, I came to realize that I was not interested in going down the CISCO certification path. So I started looking at other certifications and decided to work towards a CEH and LPT certification. After my experience with the CISCO classes, I understood that I would either have to rent time through a web lab or create my own. This book that I found that followed my mine set of build it on a shoe string and expand as your needs require. This book is great for me because the author introduces the subject in a way I can pick it up from the book and do the hands on stuff with having to already know the subject or have a reference source to go to for questions.

If you already know the subject matter, than pass this book on by for a more advanced book. If like me, you are in IT and expanding your knowledge, then this is a great book.
Comment 7 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
I am only about half way through digesting this book but it is clear to me that the orientation for a beginner is helpful. We learn the terminology and the history. We also get concrete steps to take. I am hopeful that this book will help me to generate data within one more week.
Comment 3 people found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback Verified Purchase
This is a well laid out guide for creating a test lab. It's great for beginners looking at getting into the computer security or networking field. Anyone with 1-2 years of experience would (or should) probably know everything in this book. Nonetheless, the author does a great job presenting information to the reader.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse
Format: Paperback
This is a good book for people starting out in network security. Veterans might want it for the clear explanations.
It has a useful framework, in that it expands on previous lessons. You learn what equipment you need, and how to connect it. A veteran would want more about how things work together. The book has some tools, but they are a bit dated now. It definitely needed to talk more about packet analysis. One page on Wireshark, and a mention of Netcat, minimal on remote admin tools, is just not enough. There is enough on forensics to get the beginner excited. The exercises are useful, and you have enough to build the security lab, and play in it.
Comment One person found this helpful. Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback.
Sorry, we failed to record your vote. Please try again
Report abuse