Guide to computer network security / Joseph Migga Kizza
Material type:
- 9781447145424
- TK 5105.59 .K59 2013

Item type | Current library | Home library | Collection | Call number | Copy number | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|---|
![]() |
National University - Manila | LRC - Graduate Studies General Circulation | Gen. Ed. - CCIT | GC TK 5105.59 .K59 2013 (Browse shelf(Opens below)) | c.1 | Available | NULIB000009216 |
Browsing LRC - Graduate Studies shelves, Shelving location: General Circulation, Collection: Gen. Ed. - CCIT Close shelf browser (Hides shelf browser)
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
GC TK 5105.5 .S65 2015 Fundamentals of communications and networking / | GC TK 5105.5 .W78 2013 Introduction to computer networks and cybersecurity / | GC TK 5105.59 .C65 2014 c.2 Network security through data analysis : building situational awareness / | GC TK 5105.59 .K59 2013 Guide to computer network security / | GC TK 5105.59 .K59 2014 Computer network security and cyber ethics / | GC TK 5105.59 .M35 2013 Network security : a beginner's guide / | GC TK 5105.59 .S73 2014 Cryptography and network security principles and practice / |
Includes bibliographical references and index.
Part 1. Understanding the traditional computer network security -- 1. Computer network fundamentals -- 2. Understanding computer network security -- Part 2. Security challenges to the traditional computer networks -- 3.Security threats to computer networks -- 4.Computer network vulnerabilities -- 5. Cyber crimes and hackers -- 6. Hostile scripts -- 7. Security assessment, analysis and assurance -- Part 3: Dealing with network security challenges -- 8. Disaster management -- 9. Access control and authorization -- 10. Authentication -- 11. Cryptography -- 12. Firewalls -- 13. System intrusion detection and prevention -- 14. Computer and network forensics -- 15. Virus and content filtering -- 16. Standardization and security criteria: security evaluation of computer products -- 17. Computer network security protocols -- 18. Security in wireless networks -- 19. Security in sensor networks -- Part 4. Elastic extension beyond the traditional computer network: virtualization, cloud computing and mobile systems -- 20. Mobile communication systems and related security issues -- 21. Virtualization infrastructure and related security issues -- 22.Cloud computing and related security issues -- 23.Other efforts to secure information and computer networks -- Part 5. Hands-on projects -- 24. Projects.
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.
There are no comments on this title.