Advertisement

© 2017

Guide to Computer Network Security

Textbook

Part of the Computer Communications and Networks book series (CCN)

Table of contents

  1. Front Matter
    Pages i-xxiv
  2. Introduction to Traditional Computer Network Security

    1. Front Matter
      Pages 1-1
    2. Joseph Migga Kizza
      Pages 3-40
    3. Joseph Migga Kizza
      Pages 41-57
  3. Security Issues and Challenges in the Traditional Computer Network

    1. Front Matter
      Pages 59-59
    2. Joseph Migga Kizza
      Pages 87-103
    3. Joseph Migga Kizza
      Pages 105-131
    4. Joseph Migga Kizza
      Pages 147-171
  4. Dealing with Computer Network Security Challenges

    1. Front Matter
      Pages 173-173
    2. Joseph Migga Kizza
      Pages 175-186
    3. Joseph Migga Kizza
      Pages 187-206
    4. Joseph Migga Kizza
      Pages 207-225
    5. Joseph Migga Kizza
      Pages 227-250
    6. Joseph Migga Kizza
      Pages 251-274
    7. Joseph Migga Kizza
      Pages 275-301
    8. Joseph Migga Kizza
      Pages 303-329
    9. Joseph Migga Kizza
      Pages 331-350

About this book

Introduction

This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things.

 

Topics and features:

 

·         Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies

·         Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment

·         Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems

·         Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW)

·         Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises

·         Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides

 

This essential guide serves as both a textbook and a reference “toolbox” on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers.

 

Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module.

 

Keywords

Biometrics Mobile Systems Network Security Privacy Wireless Networks

Authors and affiliations

  1. 1.University of TennesseeChattanoogaUSA

About the authors

Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module.

Bibliographic information

Industry Sectors
Pharma
Automotive
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering
Finance, Business & Banking
Electronics

Reviews

“The fourth edition of this outstanding guide is fully revised, keeping in line with the latest technological developments of the computing ecosystem, which resulted from the removal of the logical boundaries between enterprise, mobile, wireless, and home networks, as well as the rapid extension and embedding process of social networks. … This is an outstanding reference for all computer network security professionals who need to acquire knowledge shared from the great experience of the author.” (Computing Reviews, December, 2017)