Guide to Computer Network Security
If we are to believe in Moore’s law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in— ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because— rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.
1135149714
Guide to Computer Network Security
If we are to believe in Moore’s law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in— ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because— rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.
59.99 In Stock
Guide to Computer Network Security

Guide to Computer Network Security

by Joseph Migga Kizza
Guide to Computer Network Security

Guide to Computer Network Security

by Joseph Migga Kizza

eBook5th ed. 2020 (5th ed. 2020)

$59.99  $79.99 Save 25% Current price is $59.99, Original price is $79.99. You Save 25%.

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

If we are to believe in Moore’s law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in— ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because— rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.

Product Details

ISBN-13: 9783030381417
Publisher: Springer-Verlag New York, LLC
Publication date: 06/03/2020
Series: Texts in Computer Science
Sold by: Barnes & Noble
Format: eBook
File size: 19 MB
Note: This product may take a few minutes to download.

About the Author

Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.

Table of Contents

Understanding Computer Network Security.- Computer Network Fundamentals.- Understanding Computer Network Security.- Security Challenges to Computer Networks.- Security Threats to Computer Networks.- Computer Network Vulnerabilities.- Cyber Crimes and Hackers.- Hostile Scripts.- Security Assessment, Analysis, and Assurance.- Dealing with Network Security Challenges.- Disaster Management.- Access Control and Authorization.- Authentication.- Cryptography.- Firewalls.- System Intrusion Detection and Prevention.- Computer and Network Forensics.- Virus and Content Filtering.- Standardization and Security Criteria: Security Evaluation of Computer Products.- Computer Network Security Prools.- Security in Wireless Networks and Devices.- Security in Sensor Networks.- Other Efforts to Secure Information and Computer Networks.- Security Beyond Computer Networks: Information Assurance.- Projects.- Projects.
From the B&N Reads Blog

Customer Reviews