

Beschreibung
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent ...This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.
Topics and features:
· Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies
· Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment
· Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems · Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW)
· Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises
· Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides
This essential guide serves as both a textbook and a reference "toolbox" on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers.
Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module.
Autorentext
Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module.
Klappentext
This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.
Inhalt
Part I: Introduction to Computer Network Security
Computer Network Fundamentals
Computer Network Security Fundamentals
Part II: Security Issues and Challenges in the Traditional Computer Network
Security Motives and Threats to Computer Networks
Introduction to Computer Network Vulnerabilities
Cyber Crimes and Hackers
Scripting and Security in Computer Networks and Web Browsers
Security Assessment, Analysis, and Assurance
Part III: Dealing with Computer Network Security Challenges
Disaster Management
Access Control and Authorization Authentication
Cryptography
Firewalls
System Intrusion Detection and Prevention
Computer and Network Forensics
Virus and Content Filtering
Standardization and Security Criteria: Security Evaluation of Computer Products
Computer Network Security Protocols
Security in Wireless Networks and Devices
Security in Sensor Networks
Other Efforts to Secure Data in Computer Networks
Part IV: The Emergence of a Digital and Social Network Ecosystem
Virtualization Technology and Security
Cloud Computing Technology and Security Digital Mobile Systems and Corresponding Intractable Security Issues
The Internet of Things (IoT): Challenges and Security
Part V: Securing the Last Frontier in the New Ecosystem - The Home Front
Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front
Part VI: Hands-on Projects
Projects
