Guide to Computer Network Security

This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timel...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Kizza, Joseph Migga (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2017.
Έκδοση:4th ed. 2017.
Σειρά:Computer Communications and Networks,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Part I: Introduction to Computer Network Security
  • Computer Network Fundamentals
  • Computer Network Security Fundamentals
  • Part II: Security Issues and Challenges in the Traditional Computer Network
  • Security Motives and Threats to Computer Networks
  • Introduction to Computer Network Vulnerabilities
  • Cyber Crimes and Hackers
  • Scripting and Security in Computer Networks and Web Browsers
  • Security Assessment, Analysis, and Assurance
  • Part III: Dealing with Computer Network Security Challenges
  • Disaster Management
  • Access Control and Authorization
  • Authentication
  • Cryptography
  • Firewalls
  • System Intrusion Detection and Prevention
  • Computer and Network Forensics
  • Virus and Content Filtering
  • Standardization and Security Criteria: Security Evaluation of Computer Products
  • Computer Network Security Protocols
  • Security in Wireless Networks and Devices
  • Security in Sensor Networks
  • Other Efforts to Secure Data in Computer Networks
  • Part IV: The Emergence of a Digital and Social Network Ecosystem
  • Virtualization Technology and Security
  • Cloud Computing Technology and Security
  • Digital Mobile Systems and Corresponding Intractable Security Issues
  • The Internet of Things (IoT): Challenges and Security
  • Part V: Securing the Last Frontier in the New Ecosystem – The Home Front
  • Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front
  • Part VI: Hands-on Projects
  • Projects.