Skip to main content
main-content

Über dieses Buch

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Inhaltsverzeichnis

Frontmatter

Understanding Computer Network Security

1. Computer Network Fundamentals

Without Abstract

2. Understanding Network Security

Without Abstract

Security Challenges to Computer Networks

3. Security Threats to Computer Networks

Without Abstract

4. Computer Network Vulnerabilities

Without Abstract

5. Cyber Crimes and Hackers

Without Abstract

6. Hostile Scripts

Without Abstract

7. Security Assessment, Analysis, and Assurance

Without Abstract

Dealing with Network Security Challenges

8. Access Control and Authorization

Without Abstract

9. Authentication

Without Abstract

10. Cryptography

Without Abstract

11. Firewalls

Without Abstract

12. System Intrusion Detection and Prevention

Without Abstract

13. Computer and Network Forensics

Without Abstract

14. Virus and Content Filtering

Without Abstract

15. Security Evaluation of Computer Products

Without Abstract

16. Computer Network Security Protocols and Standards

Without Abstract

17. Security in Wireless Networks and Devices

Without Abstract

18. Other Efforts to Secure Information and Computer Networks

Without Abstract

19. Looking Ahead — Security Beyond Computer Networks

Without Abstract

Projects

20. Projects

Without Abstract

Backmatter

Weitere Informationen

Premium Partner