summary
It is difficult, if not impossible, to imagine a world devoid of computers. We have, over the past half century, seen a culture evolve driven by the vision of “techno-magic”, which allows us to perform everyday functions more easily, quickly, cheaply, reliably, and safely than we could when limited to manual means.
We remain, though, only human. As technology is staged in an environment still driven by human nature, the temptation to use its magical powers to less noble ends is irresistible. In an era when automobiles and aircraft are routinely involved in the conduct of criminal activity, it should come as no surprise that information networks and the computers that enable them are intrinsic to such activity as well. In this chapter, we will discuss the history and nature of computer and network technology, highlighting the fast-moving area of network security. As those charged with enforcing the law are themselves also dependent upon information technology, we will discuss the defensive as well as offensive aspects of this area.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bishop, M., “Introduction to Computer Security,” Addison Wesley Professional, 2004.
Cheswick, W.R., Bellovin, S.M., Rubin, A.D., “Firewalls and Internet Security: Repelling the Wily Hacker,” 2nd Edition, Addison Wesley Professional, 2003.
Greenburg, E., “Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer,” Wiley, 2003.
Kabay, M.E., Bosworth, S., “Computer Security Handbook, 4th Edition, Wiley, 2002 (5th Edition due 2008).
Perlman, R., “Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2nd Edition, Addison Wesley Professional, 1999.
Spafford, E.H., Garfinkel, S., Schwartz, A., Practical Unix and Internet Security, 3rd Edition,” O’Reilly Media, Inc., 2003.
Editor information
Rights and permissions
Copyright information
© 2008 Humana Press
About this chapter
Cite this chapter
Bace, R.G. (2008). History, Concepts, and Technology of Networks and Their Security. In: Barbara, J.J. (eds) Handbook of Digital and Multimedia Forensic Evidence. Humana Press. https://doi.org/10.1007/978-1-59745-577-0_4
Download citation
DOI: https://doi.org/10.1007/978-1-59745-577-0_4
Publisher Name: Humana Press
Print ISBN: 978-1-58829-782-2
Online ISBN: 978-1-59745-577-0
eBook Packages: Humanities, Social Sciences and LawSocial Sciences (R0)