Topics and features:
- Highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in current computer network technologies;
- Discusses how to develop effective security solutions, protocols, and best practices for the continuously evolving computing environment;
- Examines the role of legislation, regulation, and enforcement in securing computing and mobile systems;
- Describes the burning security issues increasingly brought about by the rapid advances in technologies like the Internet of Things, and the eroding boundaries between enterprise and home networks (NEW);
- Provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises;
Supplies additional support materials for instructors at an associated website, including laboratory exercises and projects, answers to selected exercises, and course slides This essential guide serves as both a textbook and a reference "toolbox" on all aspects of cyber security in the ever-evolving computing ecosystem. As such it will prove invaluable to a broad audience from students, researchers and practitioners in computer science and engineering, to data science security personnel and policy makers. Dr. Joseph Migga Kizza is Head and Professor, Department of Computer Science and Engineering, and past Director of the Center for Information Security and Assurance at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethics in Computing: A Concise Module.
Table of contents
Pages : | 572 |
Size : | 5.3 MB |
Downloads: | 186 |
Created: | 2022-02-02 |
License: | CC BY |
Author(s): | Joseph Migga Kizza |
Warning: Trying to access array offset on false in /home/tutovnfz/public_html/amp/article-amp.php on line 263
Others related eBooks about Guide to Computer Network Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.
For cloud users and providers alike, security is an everyday concern, yet there are very f..., download free Cloud Security tutorial in PDF (244 pages) created by Raghuram Yeluri .
Download free eBook in PDF about Intrusion Detection Systems with Snort, Advanced IDS Techniques Using Snort, Apache, MySQL, PHP, and ACID.
Download free course Rational Cybersecurity for Business, pdf file on 349 pages by Dan Blum.
Gone are the days when it was acceptable for a piece of software to live in its own little..., download free API Security tutorial in PDF (205 pages) created by .