Apress

Guide to Computer Network Security

By Joseph Migga Kizza

Guide to Computer Network Security Cover Image

This authoritative guide on computer network security covers current security solutions and best practices in both fixed and mobile computer networks. It includes chapters on 'handling disasters' and 'security in mobile network systems.'

Full Description

  • ISBN13: 978-1-8480-0916-5
  • 504 Pages
  • User Level: Students
  • Publication Date: December 24, 2008
  • Available eBook Formats: PDF
  • eBook Price: $79.95
Buy eBook Buy Print Book Add to Wishlist
Full Description
This authoritative guide explores computer network infrastructures and protocol design security flaws, as well as discussing current security solutions and best practices, in both fixed and mobile computer networks. It broadly surveys thought-provoking security issues and discusses and raises questions about the impact of these new technologies and protocols, with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies. It explores the security threats and vulnerabilities in the current network infrastructure and protocols and outlines current security efforts. It provides support materials for lecturers and students such as PowerPoint slides, syllabus suggestions, solutions, instructor manual and student laboratory materials. This text/reference is an invluable instructional and rsearch tool for undergraduates in computer and information security - it will also be a rich resource for practitioners, and professionals.
Table of Contents

Table of Contents

  1. Computer Network Fundamentals.
  2. Understanding Network Security.
  3. Security Threats to Computer Networks.
  4. Computer Network Vulnerabilities.
  5. Cyber Crimes and Hackers.
  6. Hostile Scripts.
  7. Security Assessment, Analysis and Assurance.
  8. Disaster Management.
  9. Access Control and Authorization.
  10. Authentication.
  11. Cryptography.
  12. Firewalls.
  13. System Intrusion Detection and Prevention.
  14. Computer and Network Forensics.
  15. Virus and Content Filtering.
  16. Standardization and Security Criteria: Security Evaluation of Computer Products.
  17. Computer Network Security Protocols.
  18. Security in Wireless Networks and Devices.
  19. Security in Sensor Networks.
  20. Other Efforts to Secure Information and Computer Networks.
  21. Looking Ahead: Security Beyond Computer Networks.
  22. Projects.
Errata

If you think that you've found an error in this book, please let us know about it. You will find any confirmed erratum below, so you can check if your concern has already been addressed.

* Required Fields

No errata are currently published