Authors:
- Fully revised and updated new edition, covering the latest developments in virtualization, cloud computing, mobile systems, the Internet of Things, and blockchain technology
- Includes both quick and more advanced exercises at the end of each chapter, as well as an entire chapter devoted to laboratory exercises
- Provides supporting material for instructors and students at an associated website, including slides, lab projects, and answers to selected exercises
Part of the book series: Texts in Computer Science (TCS)
Buy it now
Buying options
Tax calculation will be finalised at checkout
Other ways to access
This is a preview of subscription content, log in via an institution to check for access.
Table of contents (27 chapters)
-
Front Matter
-
Introduction to Traditional Computer Network Security
-
Front Matter
-
-
Security Issues and Challenges in the Traditional Computer Network
-
Front Matter
-
-
Dealing with Computer Network Security Challenges
-
Front Matter
-
About this book
This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces.
This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts.
Topics and features:
- Explores the full range of security risks and vulnerabilities in all connected digital systems
- Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems
- Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security
- Describes the fundamentals of traditional computer network security, and common threats to security
- Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems
- Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain
- Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects
- Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions
This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries.
Authors and Affiliations
-
Department of Computer Science and Engineering, University of Tennessee, Chattanooga, USA
Joseph Migga Kizza
About the author
Professor Joseph Migga Kizza is the Head of the Department of Computer Science and Engineering, and a former Director of the Center for Information Security, at the University of Tennessee at Chattanooga, TN, USA. Among his other publications are the successful Springer textbooks Ethical and Social Issues in the Information Age and Ethical and Secure Computing: A Concise Module.
Bibliographic Information
Book Title: Guide to Computer Network Security
Authors: Joseph Migga Kizza
Series Title: Texts in Computer Science
DOI: https://doi.org/10.1007/978-3-030-38141-7
Publisher: Springer Cham
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Nature Switzerland AG 2020
eBook ISBN: 978-3-030-38141-7Published: 03 June 2020
Series ISSN: 1868-0941
Series E-ISSN: 1868-095X
Edition Number: 5
Number of Pages: XXV, 595
Number of Illustrations: 59 b/w illustrations, 58 illustrations in colour
Topics: Information Storage and Retrieval, Data Storage Representation, Management of Computing and Information Systems, Computer Communication Networks