- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.
Contents
Part IComputer Network FundamentalsComputer Network Security FundamentalsPart II: Security Issues and Challenges in the Traditional Computer NetworkSecurity Motives and Threats to Computer NetworksIntroduction to Computer Network VulnerabilitiesCyber Crimes and HackersScripting and Security in Computer Networks and Web BrowsersSecurity Assessment, Analysis, and AssurancePart III: Dealing with Computer Network Security ChallengesDisaster ManagementAccess Control and AuthorizationAuthenticationCryptographyFirewallsSystem Intrusion Detection and PreventionComputer and Network ForensicsVirus and Content FilteringStandardization and Security Criteria: Security Evaluation of Computer ProductsComputer Network Security ProtocolsSecurity in Wireless Networks and DevicesSecurity in Sensor NetworksOther Efforts to Secure Data in Computer NetworksPart IV: The Emergence of a Digital and Social Network EcosystemVirtualization Technology and SecurityCloud Computing Technology and SecurityDigital Mobile Systems and Corresponding Intractable Security IssuesThe Internet of Things (IoT): Challenges and SecurityPart V: Securing the Last Frontier in the New Ecosystem - The Home FrontConquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home FrontPart VI: Hands-on ProjectsProjects



