語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Guide to computer network security
~
Kizza, Joseph Migga.
FindBook
Google Book
Amazon
博客來
Guide to computer network security
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Guide to computer network security/ by Joseph Migga Kizza.
作者:
Kizza, Joseph Migga.
出版者:
Cham :Springer International Publishing : : 2020.,
面頁冊數:
xxv, 595 p. :ill., digital ;24 cm.
內容註:
Part I: Introduction to Traditional Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Threats and Threat Motives to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks and Beyond -- Part IV: The Emergence of the Digital and Social Network Ecosystem - The Elastic Extension of the Traditional Computer Network Through Virtualization, Cloud Computing and Mobile Technologies -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Mobile Systems and Corresponding Intractable Security Issues -- Internet of Things (IoT): Growth, Challenges, and Security -- Blockchains, Cryptocurrency, and Smart Contracts Technology: Security Considerations -- Part V: Securing the Last Frontiers - The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-On Projects -- Projects.
Contained By:
Springer eBooks
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-030-38141-7
ISBN:
9783030381417
Guide to computer network security
Kizza, Joseph Migga.
Guide to computer network security
[electronic resource] /by Joseph Migga Kizza. - Fifth edition. - Cham :Springer International Publishing :2020. - xxv, 595 p. :ill., digital ;24 cm. - Texts in computer science,1868-0941. - Texts in computer science..
Part I: Introduction to Traditional Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Threats and Threat Motives to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks and Beyond -- Part IV: The Emergence of the Digital and Social Network Ecosystem - The Elastic Extension of the Traditional Computer Network Through Virtualization, Cloud Computing and Mobile Technologies -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Mobile Systems and Corresponding Intractable Security Issues -- Internet of Things (IoT): Growth, Challenges, and Security -- Blockchains, Cryptocurrency, and Smart Contracts Technology: Security Considerations -- Part V: Securing the Last Frontiers - The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-On Projects -- Projects.
This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the full range of security risks and vulnerabilities in all connected digital systems Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Describes the fundamentals of traditional computer network security, and common threats to security Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.
ISBN: 9783030381417
Standard No.: 10.1007/978-3-030-38141-7doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: TK5105.59 / .K599 2020
Dewey Class. No.: 005.8
Guide to computer network security
LDR
:04745nmm a2200361 a 4500
001
2255014
003
DE-He213
005
20200603135956.0
006
m d
007
cr nn 008maaau
008
220419s2020 gw s 0 eng d
020
$a
9783030381417
$q
(electronic bk.)
020
$a
9783030381400
$q
(paper)
024
7
$a
10.1007/978-3-030-38141-7
$2
doi
035
$a
978-3-030-38141-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
$b
.K599 2020
072
7
$a
UNH
$2
bicssc
072
7
$a
COM030000
$2
bisacsh
072
7
$a
UNH
$2
thema
072
7
$a
UND
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.K62 2020
100
1
$a
Kizza, Joseph Migga.
$3
815845
245
1 0
$a
Guide to computer network security
$h
[electronic resource] /
$c
by Joseph Migga Kizza.
250
$a
Fifth edition.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2020.
300
$a
xxv, 595 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Texts in computer science,
$x
1868-0941
505
0
$a
Part I: Introduction to Traditional Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Threats and Threat Motives to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks and Beyond -- Part IV: The Emergence of the Digital and Social Network Ecosystem - The Elastic Extension of the Traditional Computer Network Through Virtualization, Cloud Computing and Mobile Technologies -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Mobile Systems and Corresponding Intractable Security Issues -- Internet of Things (IoT): Growth, Challenges, and Security -- Blockchains, Cryptocurrency, and Smart Contracts Technology: Security Considerations -- Part V: Securing the Last Frontiers - The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-On Projects -- Projects.
520
$a
This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the full range of security risks and vulnerabilities in all connected digital systems Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Describes the fundamentals of traditional computer network security, and common threats to security Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.
650
0
$a
Computer security.
$3
540555
650
0
$a
Computer networks
$x
Security measures.
$3
579161
650
1 4
$a
Information Storage and Retrieval.
$3
761906
650
2 4
$a
Data Storage Representation.
$3
892664
650
2 4
$a
Management of Computing and Information Systems.
$3
892490
650
2 4
$a
Computer Communication Networks.
$3
775497
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Texts in computer science.
$3
1567573
856
4 0
$u
https://doi.org/10.1007/978-3-030-38141-7
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9410653
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .K599 2020
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入