Limit search to available items
Your search query has been changed... Tried: (investments and computer and network and resources and dire) no results found... Tried: (investments or computer or network or resources or dire)
32000 results found. Sorted by relevance .
Book Cover
E-book
Author Kizza, Joseph Migga, author.

Title Guide to computer network security / Joseph Migga Kizza
Edition 5th edition
Published Cham : Springer, 2020

Copies

Description 1 online resource (599 pages)
Series Texts in Computer Science Ser
Texts in computer science.
Contents Intro -- Preface -- What Is New in This Edition -- Audience -- Book Resources -- Instructor Support Materials -- Contents -- Part I: Introduction to Traditional Computer Network Security -- 1: Computer Network Fundamentals -- 1.1 Introduction -- 1.2 Computer Network Models -- 1.3 Computer Network Types -- 1.3.1 Local Area Networks (LANs) -- 1.3.2 Wide Area Networks (WANs) -- 1.3.3 Metropolitan Area Networks (MANs) -- 1.4 Data Communication Media Technology -- 1.4.1 Transmission Technology -- 1.4.1.1 Analog Encoding of Digital Data -- 1.4.1.2 Digital Encoding of Digital Data
1.4.1.3 Multiplexing of Transmission Signals -- 1.4.2 Transmission Media -- 1.4.2.1 Wired Transmission Media -- 1.4.2.2 Wireless Communication -- 1.5 Network Topology -- 1.5.1 Mesh -- 1.5.2 Tree -- 1.5.3 Bus -- 1.5.4 Star -- 1.5.5 Ring -- 1.6 Network Connectivity and Protocols -- 1.6.1 Open System Interconnection (OSI) Protocol Suite -- 1.6.2 Transmission Control Protocol/Internet Protocol (TCP/IP) Model -- 1.6.2.1 Application Layer -- 1.6.2.2 Transport Layer -- 1.6.2.3 Network Layer -- 1.6.2.4 Data Link Layer -- 1.6.2.5 Physical Layer -- 1.7 Network Services
1.7.1 Connection Services -- 1.7.1.1 Connection-Oriented Services -- 1.7.1.2 Connectionless Service -- 1.7.2 Network Switching Services -- 1.7.2.1 Circuit Switching -- 1.7.2.2 Packet Switching -- 1.8 Network Connecting Devices -- 1.8.1 LAN Connecting Devices -- 1.8.1.1 A Hub -- 1.8.1.2 A Repeater -- 1.8.1.3 A Bridge -- 1.8.1.4 A Switch -- 1.8.2 Internetworking Devices -- 1.8.2.1 Routers -- 1.8.2.2 Gateways -- 1.9 Network Technologies -- 1.9.1 LAN Technologies -- 1.9.1.1 Star-Based Ethernet (IEEE 802.3) LAN -- 1.9.1.2 Token Ring/IEEE 805.2 -- 1.9.1.3 Other LAN Technologies
1.9.2 WAN Technologies -- 1.9.2.1 Integrated Services Digital Network (ISDN) -- 1.9.2.2 X.25 -- 1.9.2.3 Other WAN Technologies -- 1.9.3 Wireless LANs -- 1.10 Conclusion -- References -- 2: Computer Network Security Fundamentals -- 2.1 Introduction -- 2.1.1 Computer Security -- 2.1.2 Network Security -- 2.1.3 Information Security -- 2.2 Securing the Computer Network -- 2.2.1 Hardware -- 2.2.2 Software -- 2.3 Forms of Protection -- 2.3.1 Access Control -- 2.3.1.1 Hardware Access Control Systems -- 2.3.1.2 Software Access Control Systems -- 2.3.2 Authentication
2.3.3 Confidentiality -- 2.3.4 Integrity -- 2.3.5 Nonrepudiation -- 2.4 Security Standards -- 2.4.1 Security Standards Based on Type of Service/Industry -- 2.4.1.1 Public Key Cryptography Standards (PKCS) -- 2.4.1.2 The Standards for Interoperable Secure MIME (S/MIME) -- 2.4.1.3 Federal Information Processing Standards (FIPS) -- 2.4.1.4 Secure Sockets Layer (SSL) -- 2.4.1.5 Web Services Security Standards -- 2.4.2 Security Standards Based on Size/Implementation -- 2.4.3 Security Standards Based on Interests -- 2.4.3.1 British Standard 799 (BS 7799) -- 2.4.3.2 Orange Book
Summary This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the full range of security risks and vulnerabilities in all connected digital systems Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Describes the fundamentals of traditional computer network security, and common threats to security Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries
Notes 2.4.4 Security Best Practices
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer security.
Computer networks -- Security measures.
Computer Security
Data mining.
Information architecture.
Network hardware.
Information retrieval.
Computers -- System Administration -- Storage & Retrieval.
Business & Economics -- Information Management.
Computers -- Hardware -- Network Hardware.
Computer networks -- Security measures
Computer security
Form Electronic book
ISBN 9783030381417
3030381412