Guide to computer network security / Joseph Migga Kizza.
Material type:
- text
- computer
- online resource
- 9783319556062
- 3319556061
- Computer science
- Computer networks -- Security measures
- Computer networks -- Security measures
- Computer Science
- Information Storage and Retrieval
- Data Storage Representation
- Management of Computing and Information Systems
- Computer Communication Networks
- Computers -- System Administration -- Storage & Retrieval
- Business & Economics -- Information Management
- Computers -- Hardware -- Network Hardware
- Data mining
- Information architecture
- Network hardware
- Information storage and retrieva
- Information Systems
- Computer Communication Networks
- Information retrieval
- 005.8 23
- TK5105.59
Item type | Current library | Call number | Status | |
---|---|---|---|---|
![]() |
Эрдэм шинжилгээний номын сан | 005.8 | Available |
Academic
Includes bibliographical references and index.
Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem -- The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK). UkOxU
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. UkOxU
English
Online resource; title from PDF title page (SpringerLink, viewed May 3, 2017).