000 05190nam a22005775i 4500
001 978-3-031-47549-8
003 DE-He213
005 20240730171001.0
007 cr nn 008mamaa
008 240119s2024 sz | s |||| 0|eng d
020 _a9783031475498
_9978-3-031-47549-8
024 7 _a10.1007/978-3-031-47549-8
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
100 1 _aKizza, Joseph Migga.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_996604
245 1 0 _aGuide to Computer Network Security
_h[electronic resource] /
_cby Joseph Migga Kizza.
250 _a6th ed. 2024.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2024.
300 _aXXVI, 646 p. 117 illus., 56 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTexts in Computer Science,
_x1868-095X
505 0 _a1. Computer Network Fundamentals -- Computer Network Security Fundamentals -- 2. Security Threats and Threat Motives to Computer Networks -- 3. Introduction to Computer Network Vulnerabilities -- 4. Cyber Crimes and Hackers -- 5. Scripting and Security in Computer Networks and Web Browsers -- 6. Security Assessment, Analysis, and Assurance -- 7. Disaster Management -- Access Control and Authorization -- 8. Authentication Control and Authorization -- 9. Authentication -- Cryptography -- 10. Firewalls -- 11. System Intrusion Detection and Prevention -- 12. Computer and Network Forensics -- 13. Virus and Content Filtering -- 14. Standardization and Security Criteria: Security Evaluation of Computer Products -- 15. Computer Network Security Protocols.
520 _aThis timely textbook presents a comprehensive guide to the core topics in computing and information security and assurance realms, going beyond the security of networks to the ubiquitous mobile communications and online social networks that have become part of daily life. In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness-whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing artificial intelligence models across all computing security systems spheres, blockchain technology, and the metaverse, leading toward security systems virtualizations. Topics and features: Explores the range of risks and vulnerabilities in all connected digital systems Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Describes the fundamentals of traditional computer network security, and common threats to security Discusses the role and challenges of artificial intelligence in advancing the security of computing systems' algorithms, protocols, and best practices Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science,engineering, and information management, as well as for practitioners working in data- and information-intensive industries. Professor Joseph Migga Kizza is a professor, former Head of the Department of Computer Science and Engineering, and a former Director of the UTC InfoSec Center, at the University of Tennessee at Chattanooga, USA. He also authored the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.
650 0 _aComputer networks .
_931572
650 0 _aData protection.
_97245
650 0 _aInformation storage and retrieval systems.
_922213
650 0 _aInformation retrieval.
_910134
650 0 _aComputer architecture.
_93513
650 1 4 _aComputer Communication Networks.
_996607
650 2 4 _aData and Information Security.
_931990
650 2 4 _aInformation Storage and Retrieval.
_923927
650 2 4 _aData Storage Representation.
_931576
710 2 _aSpringerLink (Online service)
_996611
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031475481
776 0 8 _iPrinted edition:
_z9783031475504
776 0 8 _iPrinted edition:
_z9783031477430
830 0 _aTexts in Computer Science,
_x1868-095X
_996612
856 4 0 _uhttps://doi.org/10.1007/978-3-031-47549-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cEBK
999 _c87336
_d87336