Guide to computer network security /

Saved in:
Bibliographic Details
Author / Creator:Kizza, Joseph Migga.
Edition:2nd ed.
Imprint:London : Springer, 2013.
Description:1 online resource (524 p.)
Language:English
Series:Computer Communications and Networks
Computer communications and networks.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/9849465
Hidden Bibliographic Details
ISBN:9781447145431 (electronic bk.)
1447145437 (electronic bk.)
9781447145424
Notes:Includes bibliographical references and index.
Description based on print version record.
Summary:This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems and social networks. Features: provides supporting material for lecturers and students, including an instructor's manual, slides, solutions, and laboratory materials; includes both quick and more thought-provoking exercises at the end of each chapter.
Other form:Print version: Kizza, Joseph Migga Guide to Computer Network Security Dordrecht : Springer, c2013 9781447145424
Review by Choice Review

This new edition (1st ed., 2009), updated to reflect advances and changes in both computing and telecommunications, provides a comprehensive look at the ever-changing landscape of cyberattacks in the wild. Kizza (Univ. of Tennessee at Chattanooga) includes a thorough primer on networking fundamentals and security concepts that will be helpful for readers with a range of expertise. The true heart of the book, however, is the vast exploration of current security measures and limitations. One of the most beneficial aspects is the way the author addresses government and industrial espionage, terrorism threats to network security, and malicious scripting on the web, repeatedly and routinely encountered by even an average Internet user. These chapters bring to life the threat from a global to a very local perspective. This is an accessible and illustrative read on the topic; it does not delve too deeply into hard mathematics as some books on the subject tend to do. It will be useful for students and anyone curious about societal and personal concerns over the safety of networks in homes, offices, big business, and government. Summing Up: Highly recommended. Lower- and upper-division undergraduates, two-year technical program students, and general readers. T. D. Richardson South University

Copyright American Library Association, used with permission.
Review by Choice Review