Guide to computer network security /
005.8
Kizza, Joseph Migga,
Guide to computer network security / Joseph Migga Kizza. - Fourth edition. - 1 online resource (xxiv, 569 pages) : illustrations. - - Computer communications and networks, 1617-7975 . - Computer communications and networks. .
Academic Includes bibliographical references and index.
Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem -- The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time;
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
English
9783319556062 3319556061
10.1007/978-3-319-55606-2 doi
com.springer.onix.9783319556062 Springer Nature
GBB8J9956 bnb
Computer science., Computer networks, Security measures.Computer networks, Security measures.Computer Science., Information Storage and Retrieval., Data Storage Representation., Management of Computing and Information Systems., Computer Communication Networks., Computers, System AdministrationStorage & Retrieval.Business & Economics, Information Management.Computers, HardwareNetwork Hardware.Data mining., Information architecture., Network hardware., Information storage and retrieva., Information Systems., Computer Communication Networks., Information retrieval.,
Electronic books.
TK5105.59
Kizza, Joseph Migga,
Guide to computer network security / Joseph Migga Kizza. - Fourth edition. - 1 online resource (xxiv, 569 pages) : illustrations. - - Computer communications and networks, 1617-7975 . - Computer communications and networks. .
Academic Includes bibliographical references and index.
Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem -- The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time;
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
English
9783319556062 3319556061
10.1007/978-3-319-55606-2 doi
com.springer.onix.9783319556062 Springer Nature
GBB8J9956 bnb
Computer science., Computer networks, Security measures.Computer networks, Security measures.Computer Science., Information Storage and Retrieval., Data Storage Representation., Management of Computing and Information Systems., Computer Communication Networks., Computers, System AdministrationStorage & Retrieval.Business & Economics, Information Management.Computers, HardwareNetwork Hardware.Data mining., Information architecture., Network hardware., Information storage and retrieva., Information Systems., Computer Communication Networks., Information retrieval.,
Electronic books.
TK5105.59