Shop now Learn more Shop now Shop All Amazon Fashion Shop Suki Ad Campaign Pieces Cloud Drive Photos Shop now Amazon Fire TV Shop now Halloween Pets Shop now Shop Fire Shop Kindle Voyage Listen in Prime Learn more Shop now
Start reading Build Your Own Security Lab on your Kindle in under a minute. Don't have a Kindle? Get your Kindle here or start reading now with a free Kindle Reading App.

Deliver to your Kindle or other device


Try it free

Sample the beginning of this book for free

Deliver to your Kindle or other device

Sorry, this item is not available in
Image not available for
Image not available

Build Your Own Security Lab: A Field Guide for Network Testing [Kindle Edition]

Michael Gregg

Print List Price: £33.99
Kindle Price: £32.29 includes VAT* & free wireless delivery via Amazon Whispernet
You Save: £1.70 (5%)
* Unlike print books, digital books are subject to VAT.

Free Kindle Reading App Anybody can read Kindle books—even without a Kindle device—with the FREE Kindle app for smartphones, tablets and computers.

To get the free app, enter your e-mail address or mobile phone number.


Amazon Price New from Used from
Kindle Edition £32.29  
Paperback £33.99  
Kindle Daily Deal
Kindle Daily Deal: Up to 70% off
Each day we unveil a new book deal at a specially discounted price--for that day only. Learn more about the Kindle Daily Deal or sign up for the Kindle Daily Deal Newsletter to receive free e-mail notifications about each day's deal.

Book Description

If your job is to design or implement IT security solutions or if you’re studying for any security certification, this is the how-to guide you’ve been looking for. Here’s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Customers Who Bought This Item Also Bought

Page of Start over
This shopping feature will continue to load items. In order to navigate out of this carousel please use your heading shortcut key to navigate to the next or previous heading.

Product Description

From the Back Cover

Many books tell you what to do. This one tells you how.

If your job is to design or implement IT security solutions, or if you′re studying for any security certification, this is the how–to guide you′ve been looking for. Here′s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real–world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.

  • Collect the necessary hardware and software and assemble your own network lab

  • Configure a bootable Linux CD

  • Explore various methods for gathering information about existing security

  • Identify automated attack and penetration tools

  • Understand cryptographic systems and encryption and authentication attacks

  • Learn to find, identify, and defeat malware

  • Address the special protection needs of wireless systems

  • Use Snort® to build an IDS that will help to detect and identify attacks in real time

DVD includes tools for actually building and implementing security solutions

  • Open source tools

  • Demo software

  • A bootable version of Linux

About the Author

Michael Gregg, CISSP, CISA, MCSE, holds a total of 19 professional certifications and is a highly respected security consultant. President of Security Solutions, Inc., he is also an expert for three web sites. Michael has authored or coauthored several books, including Security+ Street Smarts, also published by Wiley.

Product details

  • Format: Kindle Edition
  • File Size: 7138 KB
  • Print Length: 456 pages
  • Publisher: Wiley; 1 edition (21 July 2008)
  • Sold by: Amazon Media EU S.à r.l.
  • Language: English
  • ASIN: B002T6V50C
  • Text-to-Speech: Enabled
  • X-Ray:
  • Word Wise: Not Enabled
  • Enhanced Typesetting: Not Enabled
  • Amazon Bestsellers Rank: #1,607,975 Paid in Kindle Store (See Top 100 Paid in Kindle Store)
  •  Would you like to give feedback on images?

More About the Author

Discover books, learn about writers, and more.

Customer Reviews

There are no customer reviews yet on
5 star
4 star
3 star
2 star
1 star
Most Helpful Customer Reviews on (beta) 4.4 out of 5 stars  13 reviews
30 of 34 people found the following review helpful
5.0 out of 5 stars Excellent for novices 18 Nov. 2008
By A. Johnson - Published on
I'll be completely honest. I went through this in about two hours, and I plan on returning it. It simply didn't have anything new for me. I was expecting it to be more along the lines of setting up a virtual network, attempting to hack the VMs, and then checking the procedures to see if you did it right.

Instead, this book covers things like how to install OSes into VMs, gives basic overviews of tools, etc. However, this is a great book if you're at the appropriate level for it. I think this makes a good follow-up to CompTIA's Security+ certification. It'll help novices get their feet wet with actual hands-on activities. I've done nearly everything in this book on my own, and that's really the only problem with it. While I didn't pay a great deal of attention to every bit of text, it seemed to be technically accurate and free from errors.

I wish I could give a more detailed review, but I thought I'd at least post this since no one has reviewed it yet. Just take your skill level into account when considering this title. If you want more advanced books, check out the Hacking Exposed series, Grey Hat Hacking, and the Penetration Tester's Open Source Toolkit.
16 of 18 people found the following review helpful
4.0 out of 5 stars Excellent book for a beginner, not recommended for the experienced Info Sec individual 11 July 2009
By Jesse G. Lands - Published on
"Build your own Security Lab A field guide for network testing" is great at what it is intended to be: an introduction for a novice security person in what they should be working on to get experience in the field. I have Michael Gregg's Certified Ethical Hacker and in most terms I would say this book is more of a work book for the study guide. It gives you a feel for what equipment you will need and how the equipment should be connected, but doesn't go to in-depth into the nuts and bolts of it.
The book includes a copy of BackTrack and a few other tools on the DVD and these items help the novice have an idea of what tools they should be looking for on the Internet, but a better idea may be to have a central repository for the tools or include the link to the tools since most of the tools were outdated by the time the book was published.
Almost every chapter or in some cases a group of chapters could be written as a stand-alone book. The author did an excellent job of summarizing some of the areas and others I felt he could have covered in more detail.
It would have been nice to see more information on sniffers and packet analyzing. The book was labeled "field guide for network testing", but there was only a page dedicated to Wireshark. A big part of network security is analyzing the traffic that is crossing the network. The author covers some of it under Intrusion Detection, but again it is not sufficient in my opinion.
I was a little surprised by the lack of anything more than a mention of Netcat. With the value of this tool and the wide spread use of variants of the tool I would have expected a page at least of the use of the software and how it is distributed. There was no reference to Tiny and a few other tools or there variants that are in common use throughout the Internet. There was no reference to VNC, RDP or Dameware some remote administration tools that are commonly exploited on most networks.
I would have thought at this level a chapter on forensics and cryptography would have been over the top of most of the readers heads. The author does make a good job just summarizing the information just enough to wet the appetite of a serious novice. I think it would have been a great benefit to the reader to have more references to in-depth material, but a determined reader will find what they need.
The cryptography chapter gets somewhat confusing. The author is discussing symmetric algorithms and then starts discussing PGP before going back to symmetric algorithms and then goes into asymmetric algorithms. The inexperienced reader would believe that PGP is a symmetric algorithm.
Overall the book was good and the exercises were great, but anyone who has mid-level experience or greater in information security will find this book a little to novice. I have already recommended the book to a few beginners.
7 of 8 people found the following review helpful
5.0 out of 5 stars First try at Security Lab 1 Nov. 2009
By Amazon Customer - Published on
Format:Paperback|Verified Purchase
After taking several classes in the local Jr College to study for my CCNA, I came to realize that I was not interested in going down the CISCO certification path. So I started looking at other certifications and decided to work towards a CEH and LPT certification. After my experience with the CISCO classes, I understood that I would either have to rent time through a web lab or create my own. This book that I found that followed my mine set of build it on a shoe string and expand as your needs require. This book is great for me because the author introduces the subject in a way I can pick it up from the book and do the hands on stuff with having to already know the subject or have a reference source to go to for questions.

If you already know the subject matter, than pass this book on by for a more advanced book. If like me, you are in IT and expanding your knowledge, then this is a great book.
3 of 3 people found the following review helpful
5.0 out of 5 stars Helpful to a beginner. 24 Jan. 2011
By TTAllen - Published on
Format:Paperback|Verified Purchase
I am only about half way through digesting this book but it is clear to me that the orientation for a beginner is helpful. We learn the terminology and the history. We also get concrete steps to take. I am hopeful that this book will help me to generate data within one more week.
6 of 8 people found the following review helpful
4.0 out of 5 stars A good foundation 5 Feb. 2009
By Charles Tholen - Published on
The book is a solid foundation for information security practitioners or those wanting to move into the field. The author gives the reader enough to get a lab built and plenty of activities to preform in the lab. Seasoned security professionals probably already know most of what is in the book but may pick up a few new tools.
Were these reviews helpful?   Let us know

Customer Discussions

This product's forum
Discussion Replies Latest Post
No discussions yet

Ask questions, Share opinions, Gain insight
Start a new discussion
First post:
Prompts for sign-in

Search Customer Discussions
Search all Amazon discussions

Look for similar items by category