TY - BOOK AU - Kizza,Joseph Migga TI - Guide to computer network security T2 - Computer communications and networks, SN - 9783319556062 AV - TK5105.59 U1 - 005.8 23 PY - 2017/// CY - Cham, Switzerland PB - Springer KW - Computer science KW - Computer networks KW - Security measures KW - fast KW - Computer Science KW - Information Storage and Retrieval KW - Data Storage Representation KW - Management of Computing and Information Systems KW - Computer Communication Networks KW - Computers KW - System Administration KW - Storage & Retrieval KW - bisacsh KW - Business & Economics KW - Information Management KW - Hardware KW - Network Hardware KW - Data mining KW - bicssc KW - Information architecture KW - Network hardware KW - Information storage and retrieva KW - Information Systems KW - Information retrieval KW - Electronic books N1 - Academic; Includes bibliographical references and index; Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem -- The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects; Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK) UR - http://online.fliphtml5.com/lluzx/agdm/ ER -