Computer Network Security

Author:   Joseph Migga Kizza
Publisher:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2005
ISBN:  

9781441935434


Pages:   535
Publication Date:   29 October 2010
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $287.76 Quantity:  
Add to Cart

Share |

Computer Network Security


Add your own review!

Overview

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Full Product Details

Author:   Joseph Migga Kizza
Publisher:   Springer-Verlag New York Inc.
Imprint:   Springer-Verlag New York Inc.
Edition:   Softcover reprint of hardcover 1st ed. 2005
Dimensions:   Width: 15.50cm , Height: 2.80cm , Length: 23.50cm
Weight:   0.848kg
ISBN:  

9781441935434


ISBN 10:   1441935436
Pages:   535
Publication Date:   29 October 2010
Audience:   Professional and scholarly ,  Professional and scholarly ,  Professional & Vocational ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Understanding Computer Network Security.- Computer Network Fundamentals.- Understanding Network Security.- Security Challenges to Computer Networks.- Security Threats to Computer Networks.- Computer Network Vulnerabilities.- Cyber Crimes and Hackers.- Hostile Scripts.- Security Assessment, Analysis, and Assurance.- Dealing with Network Security Challenges.- Access Control and Authorization.- Authentication.- Cryptography.- Firewalls.- System Intrusion Detection and Prevention.- Computer and Network Forensics.- Virus and Content Filtering.- Security Evaluation of Computer Products.- Computer Network Security Protocols and Standards.- Security in Wireless Networks and Devices.- Other Efforts to Secure Information and Computer Networks.- Looking Ahead — Security Beyond Computer Networks.- Projects.- Projects.

Reviews

From the reviews: Computer security basics are covered in this book. ... it is targeted at students. This is evident in the very fluent and comprehensive writing style, and the generally good examples and review questions at the end of each chapter. ... the book is very well written ... with strong structuring. Every chapter has good references, and includes nice exercises and student projects as resources for lecturers. I recommend this book as a good foundational book and educational tool for network security in a university environment. (Andreas Tomek, Computing Reviews, April, 2006)


From the reviews: Computer security basics are covered in this book. ! it is targeted at students. This is evident in the very fluent and comprehensive writing style, and the generally good examples and review questions at the end of each chapter. ! the book is very well written ! with strong structuring. Every chapter has good references, and includes nice exercises and student projects as resources for lecturers. I recommend this book as a good foundational book and educational tool for network security in a university environment. (Andreas Tomek, Computing Reviews, April, 2006)


From the reviews: Computer security basics are covered in this book. ! it is targeted at students. This is evident in the very fluent and comprehensive writing style, and the generally good examples and review questions at the end of each chapter. ! the book is very well written ! with strong structuring. Every chapter has good references, and includes nice exercises and student projects as resources for lecturers. I recommend this book as a good foundational book and educational tool for network security in a university environment. (Andreas Tomek, Computing Reviews, April, 2006)


From the reviews: Computer security basics are covered in this book. ... it is targeted at students. This is evident in the very fluent and comprehensive writing style, and the generally good examples and review questions at the end of each chapter. ... the book is very well written ... with strong structuring. Every chapter has good references, and includes nice exercises and student projects as resources for lecturers. I recommend this book as a good foundational book and educational tool for network security in a university environment. (Andreas Tomek, Computing Reviews, April, 2006)


Author Information

Joseph Migga Kizza is currently a Professor of Computer Science at the University of Tennessee at Chattanooga where he teaches courses in computer network security, computer ethics, operating systems, digital design systems, and computer architecture. Professor Kizza has been invited to many international venues to speak on cyberspace security, cyberspace ethics, social and ethical issues and social issues in computing. In 2003, he was awarded the International IIS award for exemplary research in engineering and computing. He has published six books in computer network security and computer ethics, with one book translated into Japanese. He has also published several book chapters, and journal articles mostly on computer security and computer ethics, conducted a number of international workshops, and presented invited and conference papers. He was a 2004 Fulbright Scholar to Uganda. He is a UNESCO expert in Information Technology and a member of IFIP and ACM.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List