Guide to Computer Network Security

Nonfiction, Computers, Database Management, Information Storage & Retrievel, Business & Finance, Industries & Professions, Information Management, General Computing
Cover of the book Guide to Computer Network Security by Joseph Migga Kizza, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Joseph Migga Kizza ISBN: 9783319556062
Publisher: Springer International Publishing Publication: April 24, 2017
Imprint: Springer Language: English
Author: Joseph Migga Kizza
ISBN: 9783319556062
Publisher: Springer International Publishing
Publication: April 24, 2017
Imprint: Springer
Language: English

This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This fully revised and updated new edition of the definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the technology we depend on. Topics and features: highlights the magnitude of the vulnerabilities, weaknesses and loopholes inherent in computer networks; discusses how to develop effective security solutions, protocols, and best practices for the modern computing environment; examines the role of legislation, regulation, and enforcement in securing computing and mobile systems; describes the burning security issues brought about by the advent of the Internet of Things and the eroding boundaries between enterprise and home networks (NEW); provides both quickly workable and more thought-provoking exercises at the end of each chapter, with one chapter devoted entirely to hands-on exercises; supplies additional support materials for instructors at an associated website.

More books from Springer International Publishing

Cover of the book Infostorms by Joseph Migga Kizza
Cover of the book Learning and Collaboration Technologies. Learning and Teaching by Joseph Migga Kizza
Cover of the book AGILE 2015 by Joseph Migga Kizza
Cover of the book Emergent Knowledge Strategies by Joseph Migga Kizza
Cover of the book Microtechnology for Cell Manipulation and Sorting by Joseph Migga Kizza
Cover of the book Fundamentals of Computation Theory by Joseph Migga Kizza
Cover of the book Defect Evolution in Cosmology and Condensed Matter by Joseph Migga Kizza
Cover of the book Ionic Liquid Properties by Joseph Migga Kizza
Cover of the book Maintenance Overtime Policies in Reliability Theory by Joseph Migga Kizza
Cover of the book Theoretical Physics 4 by Joseph Migga Kizza
Cover of the book A Psychology of Culture by Joseph Migga Kizza
Cover of the book A User’s Guide to Network Analysis in R by Joseph Migga Kizza
Cover of the book Finding the Personal Voice in Filmmaking by Joseph Migga Kizza
Cover of the book Practicing Servant Leadership by Joseph Migga Kizza
Cover of the book Wireless Mobility in Organizations by Joseph Migga Kizza
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy