Computer and Network Security Essentials

  • Kevin Daimi

Table of contents

  1. Front Matter
    Pages i-xv
  2. Computer Security

    1. Front Matter
      Pages 1-1
    2. Jeffrey L. Duffany
      Pages 3-20
    3. Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer
      Pages 21-39
    4. Sally Mosaad, Nashwa Abdelbaki, Ahmed F. Shosha
      Pages 79-94
  3. Network Security

    1. Front Matter
      Pages 95-95
    2. Tarfa Hamed, Jason B. Ernst, Stefan C. Kremer
      Pages 113-134
    3. José María de Fuentes, Luis Hernandez-Encinas, Arturo Ribagorda
      Pages 135-151
    4. Xiujuan Du, Meiju Li, Keqin Li
      Pages 173-187
    5. Tyrone S. Toland, Sebastian Kollmannsperger, J. Bernard Brewton, William B. Craft
      Pages 189-204
  4. Cryptographic Technologies

    1. Front Matter
      Pages 205-205
    2. Riccardo Focardi, Flaminia L. Luccio, Heider A. M. Wahsheh
      Pages 207-219
    3. Khaled A. Al-Utaibi, El-Sayed M. El-Alfy
      Pages 221-236
    4. Alejandro Sanchez-Gomez, Jesus Diaz, Luis Hernandez-Encinas, David Arroyo
      Pages 263-281
    5. Victor Gayoso Martínez, Lorena González-Manzano, Agustín Martín Muñoz
      Pages 283-298
  5. Biometrics and Forensics

    1. Front Matter
      Pages 315-315
    2. Natarajan Meghanathan
      Pages 317-335
    3. Giovanni L. Masala, Pietro Ruiu, Enrico Grosso
      Pages 337-353
    4. Slobodan Petrović
      Pages 355-367
    5. Christopher Warren, Eman El-Sheikh, Nhien-An Le-Khac
      Pages 369-388
  6. Hardware Security

    1. Front Matter
      Pages 389-389
    2. Mohamed T. Abdelazim, Nashwa Abdelbaki, Ahmed F. Shosha
      Pages 391-405
    3. Fathi Amsaad, Nitin Pundir, Mohammed Niamat
      Pages 407-425
    4. Ioannis Papakonstantinou, Nicolas Sklavos
      Pages 427-442
  7. Security Applications

    1. Front Matter
      Pages 443-443
    2. Pascal Birnstill, Christoph Bier, Paul Wagner, Jürgen Beyerer
      Pages 445-460
    3. Elias Bou-Harb, Claude Fachkha
      Pages 461-474
  8. Security Management

    1. Front Matter
      Pages 491-491
    2. Bryson R. Payne, Tamirat T. Abegaz
      Pages 493-506
    3. Sana Siddiqui, Muhammad Salman Khan, Ken Ferens
      Pages 507-519
    4. Jason Ernst, Tarfa Hamed, Stefan Kremer
      Pages 555-568
    5. Thiago Gomes Rodrigues, Patricia Takako Endo, David W. S. C. Beserra, Djamel Sadok, Judith Kelner
      Pages 569-583
    6. Muhammad Salman Khan, Sana Siddiqui, Ken Ferens
      Pages 585-602
    7. Jibran Saleem, Mohammad Hammoudeh
      Pages 603-618

About this book


This book introduces readers to the tools needed to protect IT resources and communicate with security specialists when there is a security problem. The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics. It introduces the concepts, techniques, methods, approaches, and trends needed by security specialists to improve their security skills and capabilities. Further, it provides a glimpse into future directions where security techniques, policies, applications, and theories are headed. The book represents a collection of carefully selected and reviewed chapters written by diverse security experts in the listed fields and edited by prominent security researchers.


Computer Security Network Security Security Applications Security Management Cryptographic Technologies Information Assurance Biometric Security Forensic Security Hardware Security

Editors and affiliations

  • Kevin Daimi
    • 1
  1. 1.University of Detroit MercyDetroitUSA

Bibliographic information

Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Energy, Utilities & Environment
Oil, Gas & Geosciences