Guide to Computer Network Security

Nonfiction, Computers, Database Management, Information Storage & Retrievel, Business & Finance, Industries & Professions, Information Management, General Computing
Cover of the book Guide to Computer Network Security by Joseph Migga Kizza, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Joseph Migga Kizza ISBN: 9783319556062
Publisher: Springer International Publishing Publication: April 24, 2017
Imprint: Springer Language: English
Author: Joseph Migga Kizza
ISBN: 9783319556062
Publisher: Springer International Publishing
Publication: April 24, 2017
Imprint: Springer
Language: English

This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.

More books from Springer International Publishing

Cover of the book Cognitive Neuroscience of Memory Consolidation by Joseph Migga Kizza
Cover of the book Setup Planning for Machining by Joseph Migga Kizza
Cover of the book High Performance Computing by Joseph Migga Kizza
Cover of the book A Study into Financial Globalization, Economic Growth and (In)Equality by Joseph Migga Kizza
Cover of the book Art and the Challenge of Markets Volume 2 by Joseph Migga Kizza
Cover of the book Handheld Total Chemical and Biological Analysis Systems by Joseph Migga Kizza
Cover of the book Sustainable Fashion by Joseph Migga Kizza
Cover of the book Schooling for Peaceful Development in Post-Conflict Societies by Joseph Migga Kizza
Cover of the book Neural Information Processing by Joseph Migga Kizza
Cover of the book Dehumanization of Warfare by Joseph Migga Kizza
Cover of the book Mathematician for All Seasons by Joseph Migga Kizza
Cover of the book Computational Biomechanics for Medicine by Joseph Migga Kizza
Cover of the book Hole Conductor Free Perovskite-based Solar Cells by Joseph Migga Kizza
Cover of the book From Logic to Practice by Joseph Migga Kizza
Cover of the book Uterine Myoma, Myomectomy and Minimally Invasive Treatments by Joseph Migga Kizza
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy