Guide to Computer Network Security -  Joseph Migga Kizza

Guide to Computer Network Security (eBook)

eBook Download: PDF
2008 | 1. Auflage
XXIV, 576 Seiten
Springer London (Verlag)
978-1-84800-917-2 (ISBN)
Systemvoraussetzungen
55,92 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This authoritative guide explores computer network infrastructures and protocol design security flaws, as well as discussing current security solutions and best practices, in both fixed and mobile computer networks.

It broadly surveys thought-provoking security issues and discusses and raises questions about the impact of these new technologies and protocols, with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies. It explores the security threats and vulnerabilities in the current network infrastructure and protocols and outlines current security efforts. It provides support materials for lecturers and students such as PowerPoint slides, syllabus suggestions, solutions, instructor manual and student laboratory materials.

This text/reference is an invluable instructional and rsearch tool for undergraduates in computer and information security - it will also be a rich resource for practitioners, and professionals.
If we are to believe in Moore's law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in ? ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because ? rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.

Understanding Computer Network Security.- Computer Network Fundamentals.- Understanding Computer Network Security.- Security Challenges to Computer Networks.- Security Threats to Computer Networks.- Computer Network Vulnerabilities.- Cyber Crimes and Hackers.- Hostile Scripts.- Security Assessment, Analysis, and Assurance.- Dealing with Network Security Challenges.- Disaster Management.- Access Control and Authorization.- Authentication.- Cryptography.- Firewalls.- System Intrusion Detection and Prevention.- Computer and Network Forensics.- Virus and Content Filtering.- Standardization and Security Criteria: Security Evaluation of Computer Products.- Computer Network Security Protocols.- Security in Wireless Networks and Devices.- Security in Sensor Networks.- Other Efforts to Secure Information and Computer Networks.- Security Beyond Computer Networks: Information Assurance.- Projects.- Projects.

Erscheint lt. Verlag 21.10.2010
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Weitere Themen Hardware
Schlagworte biometrics • Computers • Crime • Cyberspace • Firewall • Information Technology • Infrastructure • Intelligence • investigation • mobile systems • Networks • Network Security • privacy • Professional • security • Wireless • workplace
ISBN-10 1-84800-917-8 / 1848009178
ISBN-13 978-1-84800-917-2 / 9781848009172
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 10,0 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90