Guide to computer network security

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer netw...

Full description

Saved in:
Bibliographic Details
Main Authors: Kizza, Joseph Migga.
Corporate Authors: SpringerLink (Online service)
Published:
Literature type: eBook
Language: English
Edition: 2nd ed.
Series: Computer communications and networks.
Subjects:
Online Access: http://dx.doi.org/10.1007/978-1-4471-4543-1
Summary: This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems and social networks. Features: provides supporting material for lecturers and students, including an instructor's manual, slides, solutions, and laboratory materials; includes both quick and more thought-provoking exercises at the end of each chapter.
Carrier Form: 1 online resource (xxiv, 521 p.) : ill.
Bibliography: Includes bibliographical references and index.
ISBN: 9781447145431 (electronic bk.)
1447145437 (electronic bk.)
Index Number: TK5105
CLC: TP393.08
Contents: Computer network fundamentals --
Understanding computer network security --
Security threats to computer networks --
Computer network vulnerabilities --
Cyber crimes and hackers --
Hostile scripts --
Security assessment, analysis and assurance --
Disaster management --
Access control and authorization --
Authentication --
Cryptography --
Firewalls --
System intrusion detection and prevention --
Computer and network forensics --
Virus and content filtering --
Standardization and security criteria: security evaluation of computer products --
Computer network security protocols --
Security in wireless networks --
Security in sensor networks --
Mobile communication systems and related security issues --
Virtualization infrastructure and related security issues --
Cloud computing and related security issues --
Other efforts to secure information and computer networks --
Projects.