Guide to Computer Network Security

Authors:

ISBN: 978-1-4471-4542-4 (Print) 978-1-4471-4543-1 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages i-xxiv

  2. Understanding the Traditional Computer Network Security

    1. Front Matter

      Pages 1-1

    2. No Access

      Chapter

      Pages 3-41

      Computer Network Fundamentals

    3. No Access

      Chapter

      Pages 43-59

      Understanding Computer Network Security

  3. Security Challenges to the Traditional Computer Networks

    1. Front Matter

      Pages 61-61

    2. No Access

      Chapter

      Pages 63-88

      Security Threats to Computer Networks

    3. No Access

      Chapter

      Pages 89-105

      Computer Network Vulnerabilities

    4. No Access

      Chapter

      Pages 107-132

      Cyber Crimes and Hackers

    5. No Access

      Chapter

      Pages 133-143

      Hostile Scripts

    6. No Access

      Chapter

      Pages 145-168

      Security Assessment, Analysis, and Assurance

  4. Dealing with Network Security Challenges

    1. Front Matter

      Pages 169-169

    2. No Access

      Chapter

      Pages 171-181

      Disaster Management

    3. No Access

      Chapter

      Pages 183-202

      Access Control and Authorization

    4. No Access

      Chapter

      Pages 203-221

      Authentication

    5. No Access

      Chapter

      Pages 223-245

      Cryptography

    6. No Access

      Chapter

      Pages 247-269

      Firewalls

    7. No Access

      Chapter

      Pages 271-295

      System Intrusion Detection and Prevention

    8. No Access

      Chapter

      Pages 297-321

      Computer and Network Forensics

    9. No Access

      Chapter

      Pages 323-341

      Virus and Content Filtering

    10. No Access

      Chapter

      Pages 343-355

      Standardization and Security Criteria: Security Evaluation of Computer Products

    11. No Access

      Chapter

      Pages 357-386

      Computer Network Security Protocols

    12. No Access

      Chapter

      Pages 387-411

      Security in Wireless Networks

    13. No Access

      Chapter

      Pages 413-428

      Security in Sensor Networks

  5. Elastic Extension Beyond the Traditional Computer Network: Virtualization, Cloud Computing and Mobile Systems

    1. Front Matter

      Pages 429-429

    2. No Access

      Chapter

      Pages 431-446

      Mobile Communication Systems and Related Security Issues

previous Page of 2