Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1144
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKizza, Joseph Migga. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:25:47Z-
dc.date.available2020-05-17T08:25:47Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319556062 ;en_US
dc.identifier.isbn9783319556055 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1144-
dc.descriptionQA75.5-76.95 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319556055. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things. Topics and features: e Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies e Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment e Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems e Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW) e Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises e Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This essential guide serves as both a textbook and a reference eetoolboxee on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers. Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module. . ;en_US
dc.description.statementofresponsibilityby Joseph Migga Kizza.en_US
dc.description.tableofcontentsPart I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem ee The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects. ;en_US
dc.format.extentXXIV, 569 p. 111 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesComputer Communications and Networks, ; 1617-7975. ;en_US
dc.relation.ispartofseriesComputer Communications and Networks, ; 1617-7975. ;en_US
dc.relation.haspart9783319556062.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectInformation Storage and Retrievalen_US
dc.subjectManagement Information Systemsen_US
dc.subjectComputer Scienceen_US
dc.subjectInformation Storage and Retrieval. ;en_US
dc.subjectData Storage Representation.en_US
dc.titleGuide to Computer Network Securityen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.date.edition4th ed. 2017. ;en_US
dc.classification.dc025.04 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319556062.pdf8.47 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKizza, Joseph Migga. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:25:47Z-
dc.date.available2020-05-17T08:25:47Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319556062 ;en_US
dc.identifier.isbn9783319556055 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1144-
dc.descriptionQA75.5-76.95 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319556055. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things. Topics and features: e Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies e Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment e Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems e Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW) e Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises e Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This essential guide serves as both a textbook and a reference eetoolboxee on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers. Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module. . ;en_US
dc.description.statementofresponsibilityby Joseph Migga Kizza.en_US
dc.description.tableofcontentsPart I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem ee The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects. ;en_US
dc.format.extentXXIV, 569 p. 111 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesComputer Communications and Networks, ; 1617-7975. ;en_US
dc.relation.ispartofseriesComputer Communications and Networks, ; 1617-7975. ;en_US
dc.relation.haspart9783319556062.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectInformation Storage and Retrievalen_US
dc.subjectManagement Information Systemsen_US
dc.subjectComputer Scienceen_US
dc.subjectInformation Storage and Retrieval. ;en_US
dc.subjectData Storage Representation.en_US
dc.titleGuide to Computer Network Securityen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.date.edition4th ed. 2017. ;en_US
dc.classification.dc025.04 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319556062.pdf8.47 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributor.authorKizza, Joseph Migga. ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:25:47Z-
dc.date.available2020-05-17T08:25:47Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319556062 ;en_US
dc.identifier.isbn9783319556055 (print) ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1144-
dc.descriptionQA75.5-76.95 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319556055. ;en_US
dc.descriptionen_US
dc.descriptionSpringerLink (Online service) ;en_US
dc.descriptionen_US
dc.descriptionen_US
dc.description.abstractThis definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments in system resource virtualization, cloud computing models, and mobile computing technology, including a new chapter on the Internet of Things. Topics and features: e Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies e Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment e Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems e Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW) e Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises e Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This essential guide serves as both a textbook and a reference eetoolboxee on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers. Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module. . ;en_US
dc.description.statementofresponsibilityby Joseph Migga Kizza.en_US
dc.description.tableofcontentsPart I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem ee The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects. ;en_US
dc.format.extentXXIV, 569 p. 111 illus. ; online resource. ;en_US
dc.publisherSpringer International Publishing :en_US
dc.publisherImprint: Springer,en_US
dc.relation.ispartofseriesComputer Communications and Networks, ; 1617-7975. ;en_US
dc.relation.ispartofseriesComputer Communications and Networks, ; 1617-7975. ;en_US
dc.relation.haspart9783319556062.pdfen_US
dc.subjectComputer Scienceen_US
dc.subjectComputer Communication Systemsen_US
dc.subjectData structures (Computer science). ;en_US
dc.subjectInformation Storage and Retrievalen_US
dc.subjectManagement Information Systemsen_US
dc.subjectComputer Scienceen_US
dc.subjectInformation Storage and Retrieval. ;en_US
dc.subjectData Storage Representation.en_US
dc.titleGuide to Computer Network Securityen_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.date.edition4th ed. 2017. ;en_US
dc.classification.dc025.04 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319556062.pdf8.47 MBAdobe PDFThumbnail
Preview File