Guide to Computer Network Security

Nonfiction, Computers, Database Management, Information Storage & Retrievel, Business & Finance, Industries & Professions, Information Management, General Computing
Cover of the book Guide to Computer Network Security by Joseph Migga Kizza, Springer London
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Joseph Migga Kizza ISBN: 9781447145431
Publisher: Springer London Publication: January 3, 2013
Imprint: Springer Language: English
Author: Joseph Migga Kizza
ISBN: 9781447145431
Publisher: Springer London
Publication: January 3, 2013
Imprint: Springer
Language: English

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems and social networks. Features: provides supporting material for lecturers and students, including an instructor’s manual, slides, solutions, and laboratory materials; includes both quick and more thought-provoking exercises at the end of each chapter; devotes an entire chapter to laboratory exercises; discusses flaws and vulnerabilities in computer network infrastructures and protocols; proposes practical and efficient solutions to security issues; explores the role of legislation, regulation, and law enforcement in maintaining computer and computer network security; examines the impact of developments in virtualization, cloud computing, and mobile systems.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems and social networks. Features: provides supporting material for lecturers and students, including an instructor’s manual, slides, solutions, and laboratory materials; includes both quick and more thought-provoking exercises at the end of each chapter; devotes an entire chapter to laboratory exercises; discusses flaws and vulnerabilities in computer network infrastructures and protocols; proposes practical and efficient solutions to security issues; explores the role of legislation, regulation, and law enforcement in maintaining computer and computer network security; examines the impact of developments in virtualization, cloud computing, and mobile systems.

More books from Springer London

Cover of the book FRCR Part I by Joseph Migga Kizza
Cover of the book Diagnostic Imaging of the Nose and Paranasal Sinuses by Joseph Migga Kizza
Cover of the book Strategies for Feedback Linearisation by Joseph Migga Kizza
Cover of the book Computer Medical Databases by Joseph Migga Kizza
Cover of the book Difficult Conditions in Laparoscopic Urologic Surgery by Joseph Migga Kizza
Cover of the book Sports Medicine and Arthroscopic Surgery of the Foot and Ankle by Joseph Migga Kizza
Cover of the book The BOXES Methodology by Joseph Migga Kizza
Cover of the book Sketch-based Interfaces and Modeling by Joseph Migga Kizza
Cover of the book Nonlinear Stochastic Systems with Incomplete Information by Joseph Migga Kizza
Cover of the book Specialization of Quadratic and Symmetric Bilinear Forms by Joseph Migga Kizza
Cover of the book Pediatric Critical Care Medicine by Joseph Migga Kizza
Cover of the book Grids, Clouds and Virtualization by Joseph Migga Kizza
Cover of the book Service Placement in Ad Hoc Networks by Joseph Migga Kizza
Cover of the book Embedded Operating Systems by Joseph Migga Kizza
Cover of the book Overactive Bladder in Clinical Practice by Joseph Migga Kizza
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy