Skip to main content

History, Concepts, and Technology of Networks and Their Security

  • Chapter
Handbook of Digital and Multimedia Forensic Evidence
  • 1141 Accesses

summary

It is difficult, if not impossible, to imagine a world devoid of computers. We have, over the past half century, seen a culture evolve driven by the vision of “techno-magic”, which allows us to perform everyday functions more easily, quickly, cheaply, reliably, and safely than we could when limited to manual means.

We remain, though, only human. As technology is staged in an environment still driven by human nature, the temptation to use its magical powers to less noble ends is irresistible. In an era when automobiles and aircraft are routinely involved in the conduct of criminal activity, it should come as no surprise that information networks and the computers that enable them are intrinsic to such activity as well. In this chapter, we will discuss the history and nature of computer and network technology, highlighting the fast-moving area of network security. As those charged with enforcing the law are themselves also dependent upon information technology, we will discuss the defensive as well as offensive aspects of this area.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bishop, M., “Introduction to Computer Security,” Addison Wesley Professional, 2004.

    Google Scholar 

  2. Cheswick, W.R., Bellovin, S.M., Rubin, A.D., “Firewalls and Internet Security: Repelling the Wily Hacker,” 2nd Edition, Addison Wesley Professional, 2003.

    Google Scholar 

  3. Greenburg, E., “Mission-Critical Security Planner: When Hackers Won’t Take No for an Answer,” Wiley, 2003.

    Google Scholar 

  4. Kabay, M.E., Bosworth, S., “Computer Security Handbook, 4th Edition, Wiley, 2002 (5th Edition due 2008).

    Google Scholar 

  5. Perlman, R., “Interconnections: Bridges, Routers, Switches, and Internetworking Protocols, 2nd Edition, Addison Wesley Professional, 1999.

    Google Scholar 

  6. Spafford, E.H., Garfinkel, S., Schwartz, A., Practical Unix and Internet Security, 3rd Edition,” O’Reilly Media, Inc., 2003.

    Google Scholar 

Download references

Authors

Editor information

John J. Barbara

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Humana Press

About this chapter

Cite this chapter

Bace, R.G. (2008). History, Concepts, and Technology of Networks and Their Security. In: Barbara, J.J. (eds) Handbook of Digital and Multimedia Forensic Evidence. Humana Press. https://doi.org/10.1007/978-1-59745-577-0_4

Download citation

Publish with us

Policies and ethics