Résumé
A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference.
This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.
Written for: Undergraduates or graduates; profssionals
Sommaire
- Part I : Understanding Computer Network Security
- Computer Network Fundamentals
- Understanding Network Security
- Part II: Security Challenges to Computer Networks
- Security Threats to Computer Networks
- Computer Network Vulnerabilities
- Cyber Crimes and Hackers
- Hostile Scripts
- Security Assessment, Analysis, and Assurance
- Part III: Dealing with Network Security Challenges
- Access Control and Authorization.-Authentication
- Cryptography
- Firewalls
- System Intrusion Detection and Prevention
- Computer and Network Forensics
- Virus and Content Filtering
- Security Evaluations of Computer Products
- Computer Network Security Protocols and Standards
- Security in Wireless Networks and Devices
- Other Efforts to Secure Information and Computer Networks
- Looking Ahead - Security Beyond Computer Networks
- Part IV: Projects
- Projects
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Springer |
Auteur(s) | Joseph M. Kizza |
Parution | 31/05/2005 |
Nb. de pages | 560 |
Format | 16 x 24 |
Couverture | Relié |
Poids | 1040g |
Intérieur | Noir et Blanc |
EAN13 | 9780387204734 |
ISBN13 | 978-0-387-20473-4 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet