06162nam 22006375 450 99646536050331620200705031938.03-030-38141-210.1007/978-3-030-38141-7(CKB)5280000000218564(MiAaPQ)EBC6220920(DE-He213)978-3-030-38141-7(PPN)248595830(EXLCZ)99528000000021856420200603d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierGuide to Computer Network Security[electronic resource] /by Joseph Migga Kizza5th ed. 2020.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (599 pages)Texts in Computer Science,1868-09413-030-38140-4 Part I: Introduction to Traditional Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Threats and Threat Motives to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless Networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks and Beyond -- Part IV: The Emergence of the Digital and Social Network Ecosystem – The Elastic Extension of the Traditional Computer Network Through Virtualization, Cloud Computing and Mobile Technologies -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Mobile Systems and Corresponding Intractable Security Issues -- Internet of Things (IoT): Growth, Challenges, and Security -- Blockchains, Cryptocurrency, and Smart Contracts Technology: Security Considerations -- Part V: Securing the Last Frontiers – The Home Front -- Conquering the Last Frontier in the Digital Invasion: The Home Front -- Part VI: Hands-On Projects -- Projects.This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the full range of security risks and vulnerabilities in all connected digital systems Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Describes the fundamentals of traditional computer network security, and common threats to security Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.Texts in Computer Science,1868-0941Information storage and retrievalData structures (Computer science)Management information systemsComputer scienceComputer communication systemsInformation Storage and Retrievalhttps://scigraph.springernature.com/ontologies/product-market-codes/I18032Data Storage Representationhttps://scigraph.springernature.com/ontologies/product-market-codes/I15025Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Information storage and retrieval.Data structures (Computer science).Management information systems.Computer science.Computer communication systems.Information Storage and Retrieval.Data Storage Representation.Management of Computing and Information Systems.Computer Communication Networks.005.8Kizza Joseph Miggaauthttp://id.loc.gov/vocabulary/relators/aut910924MiAaPQMiAaPQMiAaPQBOOK996465360503316Guide to Computer Network Security2282091UNISA01974cam a2200337 450099100297397970753620250430125930.0941005s1616 it af b 000 0 lat b14262782-39ule_instCICOGNARA-0361ExLBibl. Interfacoltà T. PellegrinoitaAleandro, Girolamo<il Giovane ;1574-1629>716429Antiquae tabulae marmoreae solis effigie, symbolisque exculptae accurata explicatio.1388372Antiqvae tabvlae marmoreae solis effigie, symbolisque exculptae accvrata explicatio qua priscae quaedam mythologiae, ac nonnulla praeterea vetera monumenta marmorum, gemmarum, nomismatum illustrantur.Avctore Hieronymo Aleandro ivniore. Accessit non absimilis argumenti expositio sigillorum zonae veteremstatuam marmoream cingentis.Romae,ex typographia Bartholomaei Zannetti,1616.98, [6] p. incl. pl. :illus. fold. pl.; 24 cm.Title vignette.Riproduzione in microfiche dell'originale conservato presso la Biblioteca Apostolica VaticanaWith Borro, Girolamo. Hieronymvs Borrivs Arretinvs De motu grauium, leuium. 1576.Tabula iliacaSole, culto delRomaBorro, Girolamo<1512-1592>.De motu gravium, et levium(Borro, Girolamo)Leopoldo Cicognara Program :Biblioteca Cicognara[microform] : literary sources in the history of art and kindred subjectsCatalogo ragionato dei libri d'arte e d'antichità / Leopoldo Cicognara.b1426278201-04-2228-07-16991002973979707536LE002 SB Raccolta Cicognara, mcrf 31610le002E0.00no 110000.i1573359228-07-16Antiquae tabulae marmoreae solis effigie, symbolisque exculptae accurata explicatio1388372UNISALENTOle00228-07-16mg -latit 01