Guide to Computer Network Security
This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our gro...
Main Author: | |
---|---|
Corporate Author: | |
Language: | English |
Published: |
Cham :
Springer International Publishing : Imprint: Springer,
2020.
|
Edition: | 5th ed. 2020. |
Series: | Texts in Computer Science,
|
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-030-38141-7 |
Table of Contents:
- Part I: Introduction to Traditional Computer Network Security
- Computer Network Fundamentals
- Computer Network Security Fundamentals
- Part II: Security Issues and Challenges in the Traditional Computer Network
- Security Threats and Threat Motives to Computer Networks
- Introduction to Computer Network Vulnerabilities
- Cyber Crimes and Hackers
- Scripting and Security in Computer Networks and Web Browsers
- Security Assessment, Analysis, and Assurance
- Part III: Dealing with Computer Network Security Challenges
- Disaster Management
- Access Control and Authorization
- Authentication Control and Authorization
- Authentication
- Cryptography
- Firewalls
- System Intrusion Detection and Prevention
- Computer and Network Forensics
- Virus and Content Filtering
- Standardization and Security Criteria: Security Evaluation of Computer Products
- Computer Network Security Protocols
- Security in Wireless Networks and Devices
- Security in Sensor Networks
- Other Efforts to Secure Data in Computer Networks and Beyond
- Part IV: The Emergence of the Digital and Social Network Ecosystem – The Elastic Extension of the Traditional Computer Network Through Virtualization, Cloud Computing and Mobile Technologies
- Virtualization Technology and Security
- Cloud Computing Technology and Security
- Mobile Systems and Corresponding Intractable Security Issues
- Internet of Things (IoT): Growth, Challenges, and Security
- Blockchains, Cryptocurrency, and Smart Contracts Technology: Security Considerations
- Part V: Securing the Last Frontiers – The Home Front
- Conquering the Last Frontier in the Digital Invasion: The Home Front
- Part VI: Hands-On Projects
- Projects.