Amazon cover image
Image from Amazon.com

Guide to computer network security / Joseph Migga Kizza

By: Material type: TextTextPublication details: London, United Kingdom : Springer, c2013Edition: Second EditionDescription: xxiv, 521 pages : illustrations ; 24 cmISBN:
  • 9781447145424
Subject(s): LOC classification:
  • TK 5105.59 .K59 2013
Contents:
Part 1. Understanding the traditional computer network security -- 1. Computer network fundamentals -- 2. Understanding computer network security -- Part 2. Security challenges to the traditional computer networks -- 3.Security threats to computer networks -- 4.Computer network vulnerabilities -- 5. Cyber crimes and hackers -- 6. Hostile scripts -- 7. Security assessment, analysis and assurance -- Part 3: Dealing with network security challenges -- 8. Disaster management -- 9. Access control and authorization -- 10. Authentication -- 11. Cryptography -- 12. Firewalls -- 13. System intrusion detection and prevention -- 14. Computer and network forensics -- 15. Virus and content filtering -- 16. Standardization and security criteria: security evaluation of computer products -- 17. Computer network security protocols -- 18. Security in wireless networks -- 19. Security in sensor networks -- Part 4. Elastic extension beyond the traditional computer network: virtualization, cloud computing and mobile systems -- 20. Mobile communication systems and related security issues -- 21. Virtualization infrastructure and related security issues -- 22.Cloud computing and related security issues -- 23.Other efforts to secure information and computer networks -- Part 5. Hands-on projects -- 24. Projects.
Summary: This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.
Item type: Books
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Home library Collection Call number Copy number Status Date due Barcode
Books Books National University - Manila LRC - Graduate Studies General Circulation Gen. Ed. - CCIT GC TK 5105.59 .K59 2013 (Browse shelf(Opens below)) c.1 Available NULIB000009216

Includes bibliographical references and index.

Part 1. Understanding the traditional computer network security -- 1. Computer network fundamentals -- 2. Understanding computer network security -- Part 2. Security challenges to the traditional computer networks -- 3.Security threats to computer networks -- 4.Computer network vulnerabilities -- 5. Cyber crimes and hackers -- 6. Hostile scripts -- 7. Security assessment, analysis and assurance -- Part 3: Dealing with network security challenges -- 8. Disaster management -- 9. Access control and authorization -- 10. Authentication -- 11. Cryptography -- 12. Firewalls -- 13. System intrusion detection and prevention -- 14. Computer and network forensics -- 15. Virus and content filtering -- 16. Standardization and security criteria: security evaluation of computer products -- 17. Computer network security protocols -- 18. Security in wireless networks -- 19. Security in sensor networks -- Part 4. Elastic extension beyond the traditional computer network: virtualization, cloud computing and mobile systems -- 20. Mobile communication systems and related security issues -- 21. Virtualization infrastructure and related security issues -- 22.Cloud computing and related security issues -- 23.Other efforts to secure information and computer networks -- Part 5. Hands-on projects -- 24. Projects.

This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.

There are no comments on this title.

to post a comment.