Computer Network Security

By Joseph Migga Kizza

Computer Network Security Cover Image

  • ISBN13: 978-0-3872-0473-4
  • 560 Pages
  • User Level: Students
  • Publication Date: December 5, 2005
  • Available eBook Formats: PDF
  • eBook Price: $109.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.
Table of Contents

Table of Contents

  1. Preface.
  2. Part I : Understanding Computer Network Security.
  3. Computer Network Fundamentals.
  4. Understanding Network Security.
  5. Part II: Security Challenges to Computer Networks.
  6. Security Threats to Computer Networks.
  7. Computer Network Vulnerabilities.
  8. Cyber Crimes and Hackers.
  9. Hostile Scripts.
  10. Security Assessment, Analysis, and Assurance.
  11. Part III: Dealing with Network Security Challenges.
  12. Access Control and Authorization.
  13. Authentication.
  14. Cryptography.
  15. Firewalls.
  16. System Intrusion Detection and Prevention.
  17. Computer and Network Forensics.
  18. Virus and Content Filtering.
  19. Security Evaluations of Computer Products.
  20. Computer Network Security Protocols and Standards.
  21. Security in Wireless Networks and Devices.
  22. Other Efforts to Secure Information and Computer Networks.
  23. Looking Ahead – Security Beyond Computer Networks.
  24. Part IV: Projects.
  25. Projects.
  26. Index.
Errata

Please Login to submit errata.

No errata are currently published