<P>Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these securi
A guide to computer network security
โ Scribed by Joseph Migga Kizza (auth.), Joseph Migga Kizza (eds.)
- Publisher
- Springer London
- Year
- 2009
- Tongue
- English
- Leaves
- 476
- Series
- The Computer Communications and Networks
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Front Matter....Pages I-XXIV
Front Matter....Pages 1-1
Computer Network Fundamentals....Pages 3-41
Understanding Computer Network Security....Pages 43-59
Front Matter....Pages 62-62
Security Threats to Computer Networks....Pages 63-88
Computer Network Vulnerabilities....Pages 89-106
Cyber Crimes and Hackers....Pages 107-131
Hostile Scripts....Pages 133-143
Security Assessment, Analysis, and Assurance....Pages 145-169
Front Matter....Pages 172-172
Disaster Management....Pages 173-184
Access Control and Authorization....Pages 185-204
Authentication....Pages 207-225
Cryptography....Pages 227-248
Firewalls....Pages 249-271
System Intrusion Detection and Prevention....Pages 273-298
Computer and Network Forensics....Pages 299-328
Virus and Content Filtering....Pages 331-350
Standardization and Security Criteria: Security Evaluation of Computer Products....Pages 351-363
Computer Network Security Protocols....Pages 365-395
Security in Wireless Networks and Devices....Pages 397-422
Security in Sensor Networks....Pages 423-438
Other Efforts to Secure Information and Computer Networks....Pages 439-447
Front Matter....Pages 172-172
Security Beyond Computer Networks: Information Assurance....Pages 449-453
Front Matter....Pages 455-455
Projects....Pages 457-469
Back Matter....Pages 471-476
โฆ Subjects
Information Storage and Retrieval; Data Storage Representation; Management of Computing and Information Systems; Computer Communication Networks
๐ SIMILAR VOLUMES
<P>Contemporary societies have increasing dependence on computers and computer networks, and the increasing popularity of mobile computing, have given rise to numerous computer security problems. Yet despite a high proliferation of expert remedies, a viable and comprehensive solution to these securi
<p>With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before.</p><p>This comprehensive and authoritative <i>Guide to Computer Network Security</i> exposes the various security risks and vu
<p>With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before.</p><p>This comprehensive and authoritative <i>Guide to Computer Network Security</i> exposes the various security risks and vu
This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterpri