Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Guide to computer network security
~
Kizza, Joseph Migga.
Guide to computer network security
Record Type:
Electronic resources : Monograph/item
Title/Author:
Guide to computer network securityby Joseph Migga Kizza.
Author:
Kizza, Joseph Migga.
Published:
Cham :Springer International Publishing :2017.
Description:
xxiv, 569 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Computer networksSecurity measures.
Online resource:
http://dx.doi.org/10.1007/978-3-319-55606-2
ISBN:
9783319556062$q(electronic bk.)
Guide to computer network security
Kizza, Joseph Migga.
Guide to computer network security
[electronic resource] /by Joseph Migga Kizza. - 4th ed. - Cham :Springer International Publishing :2017. - xxiv, 569 p. :ill., digital ;24 cm. - Computer communications and networks,1617-7975. - Computer communications and networks..
Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem - The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
ISBN: 9783319556062$q(electronic bk.)
Standard No.: 10.1007/978-3-319-55606-2doiSubjects--Topical Terms:
185597
Computer networks
--Security measures.
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Guide to computer network security
LDR
:02484nmm a2200337 a 4500
001
511886
003
DE-He213
005
20170425151733.0
006
m d
007
cr nn 008maaau
008
171226s2017 gw s 0 eng d
020
$a
9783319556062$q(electronic bk.)
020
$a
9783319556055$q(paper)
024
7
$a
10.1007/978-3-319-55606-2
$2
doi
035
$a
978-3-319-55606-2
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UNH
$2
bicssc
072
7
$a
UND
$2
bicssc
072
7
$a
COM030000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.K62 2017
100
1
$a
Kizza, Joseph Migga.
$3
253728
245
1 0
$a
Guide to computer network security
$h
[electronic resource] /
$c
by Joseph Migga Kizza.
250
$a
4th ed.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
xxiv, 569 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Computer communications and networks,
$x
1617-7975
505
0
$a
Part I: Introduction to Computer Network Security -- Computer Network Fundamentals -- Computer Network Security Fundamentals -- Part II: Security Issues and Challenges in the Traditional Computer Network -- Security Motives and Threats to Computer Networks -- Introduction to Computer Network Vulnerabilities -- Cyber Crimes and Hackers -- Scripting and Security in Computer Networks and Web Browsers -- Security Assessment, Analysis, and Assurance -- Part III: Dealing with Computer Network Security Challenges -- Disaster Management -- Access Control and Authorization -- Authentication -- Cryptography -- Firewalls -- System Intrusion Detection and Prevention -- Computer and Network Forensics -- Virus and Content Filtering -- Standardization and Security Criteria: Security Evaluation of Computer Products -- Computer Network Security Protocols -- Security in Wireless networks and Devices -- Security in Sensor Networks -- Other Efforts to Secure Data in Computer Networks -- Part IV: The Emergence of a Digital and Social Network Ecosystem -- Virtualization Technology and Security -- Cloud Computing Technology and Security -- Digital Mobile Systems and Corresponding Intractable Security Issues -- The Internet of Things (IoT): Challenges and Security -- Part V: Securing the Last Frontier in the New Ecosystem - The Home Front -- Conquering the Last Frontier in the New Network Ecosystem: The Invasion of the Home Front -- Part VI: Hands-on Projects -- Projects.
650
0
$a
Computer networks
$x
Security measures.
$3
185597
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Information Storage and Retrieval.
$3
274190
650
2 4
$a
Data Storage Representation.
$3
277024
650
2 4
$a
Management of Computing and Information Systems.
$3
274191
650
2 4
$a
Computer Communication Networks.
$3
218087
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Computer communications and networks.
$3
560387
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-55606-2
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000141140
電子館藏
1圖書
電子書
EB TK5105.59 K62 2017
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-55606-2
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login