Read more
This authoritative guide explores computer network infrastructures and protocol design security flaws, as well as discussing current security solutions and best practices, in both fixed and mobile computer networks.
It broadly surveys thought-provoking security issues and discusses and raises questions about the impact of these new technologies and protocols, with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies. It explores the security threats and vulnerabilities in the current network infrastructure and protocols and outlines current security efforts. It provides support materials for lecturers and students such as PowerPoint slides, syllabus suggestions, solutions, instructor manual and student laboratory materials.
This text/reference is an invluable instructional and rsearch tool for undergraduates in computer and information security - it will also be a rich resource for practitioners, and professionals.
List of contents
Computer Network Fundamentals.- Understanding Network Security.- Security Threats to Computer Networks.- Computer Network Vulnerabilities.- Cyber Crimes and Hackers.- Hostile Scripts.- Security Assessment, Analysis and Assurance.- Disaster Management.- Access Control and Authorization.- Authentication.- Cryptography.- Firewalls.- System Intrusion Detection and Prevention.- Computer and Network Forensics.- Virus and Content Filtering.- Standardization and Security Criteria: Security Evaluation of Computer Products.- Computer Network Security Protocols.- Security in Wireless Networks and Devices.- Security in Sensor Networks.- Other Efforts to Secure Information and Computer Networks.- Looking Ahead: Security Beyond Computer Networks.- Projects.
Report
From the reviews: "This book focuses on educating readers on the security problems that are likely to be encountered. Overall, this is a well-written text that will provide readers with a solid foundation in information security. it would also be appropriate as an introductory text for practitioners entering the field and for providing background and business context of security-related business issues for nontechnical managers." (W. T. Neumann, ACM Computing Reviews, May, 2009) This excellent book by Joseph Migga Kizza is very welcome. The author steers to give a thorough, complete and very readable guide to the subject. the book is well structured and presented offering the basis of a strong balanced course. stands by itself as a valuable guide. Who is it for? A very good core text for an undergraduate course in network security, and valuable for any IT professional needing to refresh his or her understanding in this area . (Times Higher Education, Issue viii, December, 2009)