Guide to Computer Network Security

Detalles Bibliográficos
Autor principal: Kizza, Joseph Migga. (Autor)
Autor Corporativo: SpringerLink (Online service)
Formato: eBook
Lenguaje:English
Publicado: Cham : Springer International Publishing : Imprint: Springer, 2017.
Edición:4th ed. 2017.
Colección:Computer Communications and Networks,
Materias:
Acceso en línea:https://doi.org/10.1007/978-3-319-55606-2
LEADER 02856nam a22003735i 4500
001 978-3-319-55606-2
005 20191028231223.0
007 cr nn 008mamaa
008 170425s2017 gw | s |||| 0|eng d
020 |a 9783319556062 
024 7 |a 10.1007/978-3-319-55606-2  |2 doi 
040 |a Sistema de Bibliotecas del Tecnológico de Costa Rica 
100 1 |a Kizza, Joseph Migga.  |e author. 
245 1 0 |a Guide to Computer Network Security  |c by Joseph Migga Kizza. 
250 |a 4th ed. 2017. 
260 # # |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2017. 
300 |a XXIV, 569 p. 111 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Computer Communications and Networks, 
505 0 |a Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem – The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects. 
650 0 |a Information storage and retrieval. 
650 0 |a Data structures (Computer science). 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 1 4 |a Information Storage and Retrieval. 
650 2 4 |a Data Storage Representation. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Computer Communication Networks. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
856 4 0 |u https://doi.org/10.1007/978-3-319-55606-2