Bültmann & Gerriets
Guide to Computer Network Security
von Joseph Migga Kizza
Verlag: Springer London
Reihe: Computer Communications and Networks
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-1-84800-917-2
Auflage: 2009
Erschienen am 24.12.2008
Sprache: Englisch
Umfang: 476 Seiten

Preis: 69,54 €

69,54 €
merken
Inhaltsverzeichnis
Klappentext

Understanding Computer Network Security.- Computer Network Fundamentals.- Understanding Computer Network Security.- Security Challenges to Computer Networks.- Security Threats to Computer Networks.- Computer Network Vulnerabilities.- Cyber Crimes and Hackers.- Hostile Scripts.- Security Assessment, Analysis, and Assurance.- Dealing with Network Security Challenges.- Disaster Management.- Access Control and Authorization.- Authentication.- Cryptography.- Firewalls.- System Intrusion Detection and Prevention.- Computer and Network Forensics.- Virus and Content Filtering.- Standardization and Security Criteria: Security Evaluation of Computer Products.- Computer Network Security Protocols.- Security in Wireless Networks and Devices.- Security in Sensor Networks.- Other Efforts to Secure Information and Computer Networks.- Security Beyond Computer Networks: Information Assurance.- Projects.- Projects.



If we are to believe in Moore's law, then every passing day brings new and advanced changes to the technology arena. We are as amazed by miniaturization of computing devices as we are amused by their speed of computation. Everything seems to be in ? ux and moving fast. We are also fast moving towards ubiquitous computing. To achieve this kind of computing landscape, new ease and seamless computing user interfaces have to be developed. Believe me, if you mature and have ever program any digital device, you are, like me, looking forward to this brave new computing landscape with anticipation. However, if history is any guide to use, we in information security, and indeed every computing device user young and old, must brace themselves for a future full of problems. As we enter into this world of fast, small and concealable ubiquitous computing devices, we are entering fertile territory for dubious, mischievous, and malicious people. We need to be on guard because, as expected, help will be slow coming because ? rst, well trained and experienced personnel will still be dif? cult to get and those that will be found will likely be very expensive as the case is today.


weitere Titel der Reihe