Skip to main content
  • Textbook
  • © 2005

Computer Network Security

  • Invaluable research tool for those versed in computer security, as a foundation for courses in computer and network security curriculums and a degree in information/ network security
  • Students or practitioners in computer science, information science, technology studies, library sciences, and information management studies will find this text particularly useful for their purposes
  • In addition, it is a rich resource for those looking to gain an understanding of computer infrastructures and network security threats
  • Includes supplementary material: sn.pub/extras

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 chapters)

  1. Front Matter

    Pages i-xxii
  2. Understanding Computer Network Security

  3. Security Challenges to Computer Networks

    1. Cyber Crimes and Hackers

      Pages 131-162
    2. Hostile Scripts

      Pages 163-176

About this book

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Reviews

From the reviews:

"Computer security basics are covered in this book. … it is targeted at students. This is evident in the very fluent and comprehensive writing style, and the generally good examples and review questions at the end of each chapter. … the book is very well written … with strong structuring. Every chapter has good references, and includes nice exercises and student projects as resources for lecturers. I recommend this book as a good foundational book and educational tool for network security in a university environment." (Andreas Tomek, Computing Reviews, April, 2006)

Authors and Affiliations

  • Department of Computer Science, 314B EMCS, University of Tennessee-Chattanooga, Chattanooga

    Joseph Migga Kizza

About the author

Joseph Migga Kizza is currently a Professor of Computer Science at the University of Tennessee at Chattanooga where he teaches courses in computer network security, computer ethics, operating systems, digital design systems, and computer architecture. Professor Kizza has been invited to many international venues to speak on cyberspace security, cyberspace ethics, social and ethical issues and social issues in computing. In 2003, he was awarded the International IIS award for exemplary research in engineering and computing. He has published six books in computer network security and computer ethics, with one book translated into Japanese. He has also published several book chapters, and journal articles mostly on computer security and computer ethics, conducted a number of international workshops, and presented invited and conference papers. He was a 2004 Fulbright Scholar to Uganda. He is a UNESCO expert in Information Technology and a member of IFIP and ACM.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access