A Guide to Computer Network Security

Editors:

ISBN: 978-1-84800-916-5 (Print) 978-1-84800-917-2 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XXIV

  2. Understanding Computer Network Security

    1. Front Matter

      Pages 1-1

    2. No Access

      Book Chapter

      Pages 3-41

      Computer Network Fundamentals

    3. No Access

      Book Chapter

      Pages 43-59

      Understanding Computer Network Security

  3. Security Challenges to Computer Networks

    1. Front Matter

      Pages 62-62

    2. No Access

      Book Chapter

      Pages 63-88

      Security Threats to Computer Networks

    3. No Access

      Book Chapter

      Pages 89-106

      Computer Network Vulnerabilities

    4. No Access

      Book Chapter

      Pages 107-131

      Cyber Crimes and Hackers

    5. No Access

      Book Chapter

      Pages 133-143

      Hostile Scripts

    6. No Access

      Book Chapter

      Pages 145-169

      Security Assessment, Analysis, and Assurance

  4. Dealing with Network Security Challenges

    1. Front Matter

      Pages 172-172

    2. No Access

      Book Chapter

      Pages 173-184

      Disaster Management

    3. No Access

      Book Chapter

      Pages 185-204

      Access Control and Authorization

    4. No Access

      Book Chapter

      Pages 207-225

      Authentication

    5. No Access

      Book Chapter

      Pages 227-248

      Cryptography

    6. No Access

      Book Chapter

      Pages 249-271

      Firewalls

    7. No Access

      Book Chapter

      Pages 273-298

      System Intrusion Detection and Prevention

    8. No Access

      Book Chapter

      Pages 299-328

      Computer and Network Forensics

    9. No Access

      Book Chapter

      Pages 331-350

      Virus and Content Filtering

    10. No Access

      Book Chapter

      Pages 351-363

      Standardization and Security Criteria: Security Evaluation of Computer Products

    11. No Access

      Book Chapter

      Pages 365-395

      Computer Network Security Protocols

    12. No Access

      Book Chapter

      Pages 397-422

      Security in Wireless Networks and Devices

    13. No Access

      Book Chapter

      Pages 423-438

      Security in Sensor Networks

    14. No Access

      Book Chapter

      Pages 439-447

      Other Efforts to Secure Information and Computer Networks

previous Page of 2