Guide to computer network security / Joseph Migga Kizza

By: Kizza, Joseph Migga [author]Material type: TextTextSeries: The Computer Communications and NetworksPublication details: London : Springer, c2013Edition: Second EditionDescription: xxiv, 521 pages : illustrations ; 24 cmISBN: 9781447145424Subject(s): COMPUTER NETWORKS -- SECURITY MEASURES | COMPUTER NETWORKS -- ACCESS CONTROL | COMPUTER SECURITY | COMPUTER CRIMES -- PREVENTION | COMPUTER SCIENCE | MANAGEMENT INFORMATION SYSTEMS | COMPUTER NETWORKS | DATA STRUCTURES (COMPUTER SCIENCE)LOC classification: TK 5105.59 .K59 2013
Contents:
Part 1. Understanding the traditional computer network security -- 1. Computer network fundamentals -- 2. Understanding computer network security -- Part 2. Security challenges to the traditional computer networks -- 3.Security threats to computer networks -- 4.Computer network vulnerabilities -- 5. Cyber crimes and hackers -- 6. Hostile scripts -- 7. Security assessment, analysis and assurance -- Part 3: Dealing with network security challenges -- 8. Disaster management -- 9. Access control and authorization -- 10. Authentication -- 11. Cryptography -- 12. Firewalls -- 13. System intrusion detection and prevention -- 14. Computer and network forensics -- 15. Virus and content filtering -- 16. Standardization and security criteria: security evaluation of computer products -- 17. Computer network security protocols -- 18. Security in wireless networks -- 19. Security in sensor networks -- Part 4. Elastic extension beyond the traditional computer network: virtualization, cloud computing and mobile systems -- 20. Mobile communication systems and related security issues -- 21. Virtualization infrastructure and related security issues -- 22.Cloud computing and related security issues -- 23.Other efforts to secure information and computer networks -- Part 5. Hands-on projects -- 24. Projects.
Summary: This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current library Home library Collection Shelving location Call number Copy number Status Date due Barcode
Books Books LRC - Graduate Studies
National University - Manila
Gen. Ed. - CCIT General Circulation GC TK 5105.59 .K59 2013 (Browse shelf (Opens below)) c.1 Available NULIB000009216

Includes bibliographical references and index.

Part 1. Understanding the traditional computer network security -- 1. Computer network fundamentals -- 2. Understanding computer network security -- Part 2. Security challenges to the traditional computer networks -- 3.Security threats to computer networks -- 4.Computer network vulnerabilities -- 5. Cyber crimes and hackers -- 6. Hostile scripts -- 7. Security assessment, analysis and assurance -- Part 3: Dealing with network security challenges -- 8. Disaster management -- 9. Access control and authorization -- 10. Authentication -- 11. Cryptography -- 12. Firewalls -- 13. System intrusion detection and prevention -- 14. Computer and network forensics -- 15. Virus and content filtering -- 16. Standardization and security criteria: security evaluation of computer products -- 17. Computer network security protocols -- 18. Security in wireless networks -- 19. Security in sensor networks -- Part 4. Elastic extension beyond the traditional computer network: virtualization, cloud computing and mobile systems -- 20. Mobile communication systems and related security issues -- 21. Virtualization infrastructure and related security issues -- 22.Cloud computing and related security issues -- 23.Other efforts to secure information and computer networks -- Part 5. Hands-on projects -- 24. Projects.

This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.

There are no comments on this title.

to post a comment.

© 2021 NU LRC. All rights reserved.Privacy Policy I Powered by: KOHA