- Full Description
This authoritative guide explores computer network infrastructures and protocol design security flaws, as well as discussing current security solutions and best practices, in both fixed and mobile computer networks. It broadly surveys thought-provoking security issues and discusses and raises questions about the impact of these new technologies and protocols, with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies. It explores the security threats and vulnerabilities in the current network infrastructure and protocols and outlines current security efforts. It provides support materials for lecturers and students such as PowerPoint slides, syllabus suggestions, solutions, instructor manual and student laboratory materials. This text/reference is an invluable instructional and rsearch tool for undergraduates in computer and information security - it will also be a rich resource for practitioners, and professionals.
- Table of Contents
Table of Contents
- Computer Network Fundamentals.
- Understanding Network Security.
- Security Threats to Computer Networks.
- Computer Network Vulnerabilities.
- Cyber Crimes and Hackers.
- Hostile Scripts.
- Security Assessment, Analysis and Assurance.
- Disaster Management.
- Access Control and Authorization.
- System Intrusion Detection and Prevention.
- Computer and Network Forensics.
- Virus and Content Filtering.
- Standardization and Security Criteria: Security Evaluation of Computer Products.
- Computer Network Security Protocols.
- Security in Wireless Networks and Devices.
- Security in Sensor Networks.
- Other Efforts to Secure Information and Computer Networks.
- Looking Ahead: Security Beyond Computer Networks.
If you think that you've found an error in this book, please let us know by emailing to firstname.lastname@example.org . You will find any confirmed erratum below, so you can check if your concern has already been addressed. No errata are currently published