Guide to computer network security. (2020)
- Record Type:
- Book
- Title:
- Guide to computer network security. (2020)
- Main Title:
- Guide to computer network security
- Further Information:
- Note: Joseph Migga Kizza.
- Other Names:
- Kizza, Joseph Migga
- Contents:
- Intro -- Preface -- What Is New in This Edition -- Audience -- Book Resources -- Instructor Support Materials -- Contents -- Part I: Introduction to Traditional Computer Network Security -- 1: Computer Network Fundamentals -- 1.1 Introduction -- 1.2 Computer Network Models -- 1.3 Computer Network Types -- 1.3.1 Local Area Networks (LANs) -- 1.3.2 Wide Area Networks (WANs) -- 1.3.3 Metropolitan Area Networks (MANs) -- 1.4 Data Communication Media Technology -- 1.4.1 Transmission Technology -- 1.4.1.1 Analog Encoding of Digital Data -- 1.4.1.2 Digital Encoding of Digital Data 1.4.1.3 Multiplexing of Transmission Signals -- 1.4.2 Transmission Media -- 1.4.2.1 Wired Transmission Media -- 1.4.2.2 Wireless Communication -- 1.5 Network Topology -- 1.5.1 Mesh -- 1.5.2 Tree -- 1.5.3 Bus -- 1.5.4 Star -- 1.5.5 Ring -- 1.6 Network Connectivity and Protocols -- 1.6.1 Open System Interconnection (OSI) Protocol Suite -- 1.6.2 Transmission Control Protocol/Internet Protocol (TCP/IP) Model -- 1.6.2.1 Application Layer -- 1.6.2.2 Transport Layer -- 1.6.2.3 Network Layer -- 1.6.2.4 Data Link Layer -- 1.6.2.5 Physical Layer -- 1.7 Network Services 1.7.1 Connection Services -- 1.7.1.1 Connection-Oriented Services -- 1.7.1.2 Connectionless Service -- 1.7.2 Network Switching Services -- 1.7.2.1 Circuit Switching -- 1.7.2.2 Packet Switching -- 1.8 Network Connecting Devices -- 1.8.1 LAN Connecting Devices -- 1.8.1.1 A Hub -- 1.8.1.2 A Repeater -- 1.8.1.3 A Bridge -- 1.8.1.4 A Switch -- 1.8.2Intro -- Preface -- What Is New in This Edition -- Audience -- Book Resources -- Instructor Support Materials -- Contents -- Part I: Introduction to Traditional Computer Network Security -- 1: Computer Network Fundamentals -- 1.1 Introduction -- 1.2 Computer Network Models -- 1.3 Computer Network Types -- 1.3.1 Local Area Networks (LANs) -- 1.3.2 Wide Area Networks (WANs) -- 1.3.3 Metropolitan Area Networks (MANs) -- 1.4 Data Communication Media Technology -- 1.4.1 Transmission Technology -- 1.4.1.1 Analog Encoding of Digital Data -- 1.4.1.2 Digital Encoding of Digital Data 1.4.1.3 Multiplexing of Transmission Signals -- 1.4.2 Transmission Media -- 1.4.2.1 Wired Transmission Media -- 1.4.2.2 Wireless Communication -- 1.5 Network Topology -- 1.5.1 Mesh -- 1.5.2 Tree -- 1.5.3 Bus -- 1.5.4 Star -- 1.5.5 Ring -- 1.6 Network Connectivity and Protocols -- 1.6.1 Open System Interconnection (OSI) Protocol Suite -- 1.6.2 Transmission Control Protocol/Internet Protocol (TCP/IP) Model -- 1.6.2.1 Application Layer -- 1.6.2.2 Transport Layer -- 1.6.2.3 Network Layer -- 1.6.2.4 Data Link Layer -- 1.6.2.5 Physical Layer -- 1.7 Network Services 1.7.1 Connection Services -- 1.7.1.1 Connection-Oriented Services -- 1.7.1.2 Connectionless Service -- 1.7.2 Network Switching Services -- 1.7.2.1 Circuit Switching -- 1.7.2.2 Packet Switching -- 1.8 Network Connecting Devices -- 1.8.1 LAN Connecting Devices -- 1.8.1.1 A Hub -- 1.8.1.2 A Repeater -- 1.8.1.3 A Bridge -- 1.8.1.4 A Switch -- 1.8.2 Internetworking Devices -- 1.8.2.1 Routers -- 1.8.2.2 Gateways -- 1.9 Network Technologies -- 1.9.1 LAN Technologies -- 1.9.1.1 Star-Based Ethernet (IEEE 802.3) LAN -- 1.9.1.2 Token Ring/IEEE 805.2 -- 1.9.1.3 Other LAN Technologies 1.9.2 WAN Technologies -- 1.9.2.1 Integrated Services Digital Network (ISDN) -- 1.9.2.2 X.25 -- 1.9.2.3 Other WAN Technologies -- 1.9.3 Wireless LANs -- 1.10 Conclusion -- References -- 2: Computer Network Security Fundamentals -- 2.1 Introduction -- 2.1.1 Computer Security -- 2.1.2 Network Security -- 2.1.3 Information Security -- 2.2 Securing the Computer Network -- 2.2.1 Hardware -- 2.2.2 Software -- 2.3 Forms of Protection -- 2.3.1 Access Control -- 2.3.1.1 Hardware Access Control Systems -- 2.3.1.2 Software Access Control Systems -- 2.3.2 Authentication 2.3.3 Confidentiality -- 2.3.4 Integrity -- 2.3.5 Nonrepudiation -- 2.4 Security Standards -- 2.4.1 Security Standards Based on Type of Service/Industry -- 2.4.1.1 Public Key Cryptography Standards (PKCS) -- 2.4.1.2 The Standards for Interoperable Secure MIME (S/MIME) -- 2.4.1.3 Federal Information Processing Standards (FIPS) -- 2.4.1.4 Secure Sockets Layer (SSL) -- 2.4.1.5 Web Services Security Standards -- 2.4.2 Security Standards Based on Size/Implementation -- 2.4.3 Security Standards Based on Interests -- 2.4.3.1 British Standard 799 (BS 7799) -- 2.4.3.2 Orange Book … (more)
- Edition:
- 5th ed
- Publisher Details:
- Cham : Springer
- Publication Date:
- 2020
- Extent:
- 1 online resource (599 p.)
- Subjects:
- 005.8
Computer security
Computer networks -- Security measures
Data mining
Information architecture
Network hardware
Information retrieval
Computers -- System Administration -- Storage & Retrieval
Business & Economics -- Information Management
Computers -- Hardware -- Network Hardware
Computer networks -- Security measures
Computer security
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783030381417
3030381412 - Related ISBNs:
- 9783030381400
- Notes:
- Note: Includes bibliographical references and index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.506598
- Ingest File:
- 03_081.xml