Overview
- Fully revised and updated new edition, covering the latest developments in virtualization, cloud computing, and mobile systems
- Includes both quick and more advanced exercises at the end of each chapter, as well as an entire chapter devoted to laboratory exercises
- Provides supporting material for instructors and students at an associated website, including slides, lab projects, and answers to selected exercises
- Includes supplementary material: sn.pub/extras
Part of the book series: Computer Communications and Networks (CCN)
Access this book
Other ways to access
Table of contents (25 chapters)
-
Dealing with Computer Network Security Challenges
-
Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems
-
Securing the Last Frontiers – The Home Front
-
Hands-on Projects
Keywords
About this book
Features: introduces the fundamentals of traditional computer networks and the security threats they face; discusses the security challenges introduced by virtualization software, cloud computing and mobile systems; examines the security quagmire presented by the home computing environment; raises important legislative, legal, social, technical and ethical security issues, including the tension between the needs of individual privacy and collective security; provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to lab exercises; supplies additional support material for instructors at an associated website.
Reviews
“The book offers relevant definitions in the field of security and computer networks … . The book is definitively addressed to the general nonspecialist public; practitioners may be able to consult it for some definitions. … It is, in my view, important to emphasize that all of the topics are covered in a merely definitional, descriptive way.” (Carla Sánchez Aguilar, Computing Reviews, April, 2016)
“The book contains exercises and advanced exercises, along with relevant references, and comes with support materials for instructors … making it useful for teaching courses on computer security. … The exercises and projects are helpful for teaching. … I believe the third edition will continue to receive praise from students, researchers, and practitioners. I strongly recommend it.” (S. V. Nagaraj, Computing Reviews, August, 2015)
Authors and Affiliations
About the author
Bibliographic Information
Book Title: Guide to Computer Network Security
Authors: Joseph Migga Kizza
Series Title: Computer Communications and Networks
DOI: https://doi.org/10.1007/978-1-4471-6654-2
Publisher: Springer London
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer-Verlag London Ltd., part of Springer Nature 2015
Series ISSN: 1617-7975
Series E-ISSN: 2197-8433
Edition Number: 3
Number of Pages: XXII, 545
Number of Illustrations: 50 b/w illustrations, 58 illustrations in colour
Topics: Information Storage and Retrieval, Data Storage Representation, Management of Computing and Information Systems, Computer Communication Networks
Industry Sectors: Aerospace, Biotechnology, Electronics, Energy, Utilities & Environment, IT & Software, Law, Telecommunications