
At a Glance
562 Pages
23.5 x 16.51 x 3.18
Hardcover
$84.99
or 4 interest-free payments of $21.25 with
orShips in 5 to 7 business days
Industry Reviews
From the reviews:
"Computer security basics are covered in this book. ... it is targeted at students. This is evident in the very fluent and comprehensive writing style, and the generally good examples and review questions at the end of each chapter. ... the book is very well written ... with strong structuring. Every chapter has good references, and includes nice exercises and student projects as resources for lecturers. I recommend this book as a good foundational book and educational tool for network security in a university environment." (Andreas Tomek, Computing Reviews, April, 2006)
| Preface | p. xix |
| Understanding Computer Network Security | |
| Computer Network Fundamentals | p. 3 |
| Introduction | p. 3 |
| Computer Network Models | p. 4 |
| Computer Network Types | p. 5 |
| Data Communication Media Technology | p. 8 |
| Network Topology | p. 15 |
| Network Connectivity and Protocols | p. 19 |
| Network Services | p. 26 |
| Network Connecting Devices | p. 30 |
| Network Technologies | p. 39 |
| Conclusion | p. 46 |
| References | p. 46 |
| Exercises | p. 46 |
| Advanced Exercises | p. 47 |
| Understanding Network Security | p. 49 |
| What Is Network Security? | p. 49 |
| What are we protecting? | p. 53 |
| Security Services | p. 54 |
| Security Standards | p. 59 |
| Elements of Security | p. 69 |
| References | p. 72 |
| Exercises | p. 72 |
| Advanced Exercises | p. 73 |
| Security Challenges to Computer Networks | |
| Security Threats to Computer Networks | p. 77 |
| Introduction | p. 77 |
| Sources of Security Threats | p. 79 |
| Security Threat Motives | p. 97 |
| Security Threat Management | p. 100 |
| Security Threat Correlation | p. 101 |
| Security Threat Awareness | p. 103 |
| References | p. 104 |
| Exercises | p. 105 |
| Advanced Exercises | p. 106 |
| Computer Network Vulnerabilities | p. 109 |
| Definition | p. 109 |
| Sources of Vulnerabilities | p. 109 |
| Vulnerability Assessment | p. 126 |
| References | p. 128 |
| Exercises | p. 129 |
| Advanced Exercises | p. 129 |
| Cyber Crimes and Hackers | p. 131 |
| Introduction | p. 131 |
| Cyber Crimes | p. 132 |
| Hackers | p. 137 |
| Dealing with the Rising Tide of Cyber Crimes | p. 158 |
| Conclusion | p. 160 |
| References | p. 160 |
| Exercises | p. 162 |
| Advanced Exercises | p. 162 |
| Hostile Scripts | p. 163 |
| Introduction | p. 163 |
| Introduction to the Common Gateway Interface (CGI) | p. 164 |
| CGI Scripts in a Three-Way Handshake | p. 165 |
| Server - CGI Interface | p. 167 |
| CGI Script Security Issues | p. 168 |
| Web Script Security Issues | p. 170 |
| Dealing with the Script Security Problems | p. 170 |
| Scripting Languages | p. 171 |
| References | p. 175 |
| Exercises | p. 175 |
| Advanced Exercises | p. 175 |
| Security Assessment, Analysis, and Assurance | p. 177 |
| Introduction | p. 177 |
| System Security Policy | p. 178 |
| Building a Security Policy | p. 181 |
| Security Requirements Specification | p. 189 |
| Threat Identification | p. 190 |
| Threat Analysis | p. 195 |
| Vulnerability Identification and Assessment | p. 197 |
| Security Certification | p. 201 |
| Security Monitoring and Auditing | p. 202 |
| Products and Services | p. 205 |
| References | p. 206 |
| Exercises | p. 206 |
| Advanced Exercises | p. 207 |
| Dealing with Network Security Challenges | |
| Access Control and Authorization | p. 209 |
| Definitions | p. 209 |
| Access Rights | p. 210 |
| Access Control Systems | p. 218 |
| Authorization | p. 224 |
| Types of Authorization Systems | p. 226 |
| Authorization Principles | p. 228 |
| Authorization Granularity | p. 229 |
| Web Access and Authorization | p. 230 |
| References | p. 231 |
| Exercises | p. 231 |
| Advanced Exercises | p. 232 |
| Authentication | p. 233 |
| Definition | p. 233 |
| Multiple Factors and Effectiveness of Authentication | p. 235 |
| Authentication Elements | p. 237 |
| Types of Authentication | p. 239 |
| Authentication Methods | p. 241 |
| Developing an Authentication Policy | p. 252 |
| References | p. 254 |
| Exercises | p. 255 |
| Advanced Exercises | p. 255 |
| Cryptography | p. 257 |
| Definition | p. 257 |
| Symmetric Encryption | p. 261 |
| Public Key Encryption | p. 265 |
| Enhancing Security: Combining Symmetric and Public Key Encryptions | p. 269 |
| Key Management: Generation, Transportation, and Distribution | p. 269 |
| Public Key Infrastructure (PKI) | p. 277 |
| Hash Function | p. 279 |
| Digital Signatures | p. 280 |
| References | p. 282 |
| Exercises | p. 283 |
| Advanced Exercises | p. 283 |
| Firewalls | p. 285 |
| Definition | p. 285 |
| Types of Firewalls | p. 289 |
| Configuration and Implementation of a Firewall | p. 302 |
| The Demilitarized Zone (DMZ) | p. 304 |
| Improving Security Through the Firewall | p. 307 |
| Firewall Forensics | p. 309 |
| Firewall Services and Limitations | p. 309 |
| References | p. 311 |
| Exercises | p. 312 |
| Advanced Exercises | p. 312 |
| System Intrusion Detection and Prevention | p. 315 |
| Definition | p. 315 |
| Intrusion Detection | p. 316 |
| Intrusion Detection Systems (IDSs) | p. 319 |
| Types of Intrusion Detection Systems | p. 323 |
| The Changing Nature of IDS Tools | p. 333 |
| Other Types of Intrusion Detection Systems | p. 333 |
| Response to System Intrusion | p. 336 |
| Challenges to Intrusion Detection Systems | p. 337 |
| Implementing an Intrusion Detection System | p. 339 |
| Intrusion Prevention Systems (IPS) | p. 339 |
| Intrusion Detection Tools | p. 343 |
| References | p. 344 |
| Exercises | p. 345 |
| Advanced Exercises | p. 346 |
| Computer and Network Forensics | p. 347 |
| Definition | p. 347 |
| Computer Forensics | p. 349 |
| Network Forensics | p. 367 |
| Forensics Tools | p. 374 |
| References | p. 383 |
| Exercises | p. 384 |
| Advanced Exercises | p. 384 |
| Virus and Content Filtering | p. 387 |
| Definition | p. 387 |
| Scanning, Filtering, and Blocking | p. 387 |
| Virus Filtering | p. 393 |
| Content Filtering | p. 402 |
| Spam | p. 407 |
| References | p. 409 |
| Exercises | p. 410 |
| Advanced Exercises | p. 410 |
| Security Evaluations of Computer Products | p. 411 |
| Introduction | p. 411 |
| Security Standards and Criteria | p. 412 |
| The Product Security Evaluation Process | p. 412 |
| Computer Products Evaluation Standards | p. 416 |
| Major Evaluation Criteria | p. 417 |
| Does Evaluation Mean Security? | p. 422 |
| References | p. 422 |
| Exercises | p. 423 |
| Advanced Exercises | p. 423 |
| Computer Network Security Protocols and Standards | p. 425 |
| Introduction | p. 425 |
| Application Level Security | p. 426 |
| Security in the Transport Layer | p. 440 |
| Security in the Network Layer | p. 446 |
| Security in the Link Layer and over LANS | p. 456 |
| References | p. 460 |
| Exercises | p. 460 |
| Advanced Exercises | p. 461 |
| Security in Wireless Networks and Devices | p. 463 |
| Introduction | p. 463 |
| Cellular Wireless Communication Network Infrastructure | p. 464 |
| Wireless LAN (WLAN) or Wireless Fidelity (Wi-Fi) | p. 474 |
| Standards for Wireless Networks | p. 478 |
| Security in Wireless Networks | p. 482 |
| References | p. 491 |
| Exercises | p. 492 |
| Advanced Exercises | p. 493 |
| Other Efforts to Secure Information and Computer Networks | p. 495 |
| Introduction | p. 495 |
| Legislation | p. 496 |
| Regulation | p. 496 |
| Self-Regulation | p. 497 |
| Education | p. 499 |
| Reporting Centers | p. 501 |
| Market Forces | p. 502 |
| Activism | p. 502 |
| References | p. 503 |
| Exercises | p. 504 |
| Advanced Exercises | p. 505 |
| Looking Ahead - Security Beyond Computer Networks | p. 507 |
| Introduction | p. 507 |
| Collective Security Initiatives and Best Practices | p. 508 |
| References | p. 510 |
| Projects | |
| Projects | p. 513 |
| Introduction | p. 513 |
| Part I: Weekly/Biweekly Laboratory Assignments | p. 513 |
| Part II: Semester Projects | p. 517 |
| Part III: Research Projects | p. 524 |
| Index | p. 529 |
| Table of Contents provided by Ingram. All Rights Reserved. |
ISBN: 9780387204734
ISBN-10: 0387204733
Published: 7th April 2005
Format: Hardcover
Language: English
Number of Pages: 562
Audience: Professional and Scholarly
Publisher: Springer Nature B.V.
Country of Publication: US
Dimensions (cm): 23.5 x 16.51 x 3.18
Weight (kg): 1.04
Shipping
| Standard Shipping | Express Shipping | |
|---|---|---|
| Metro postcodes: | $9.99 | $14.95 |
| Regional postcodes: | $9.99 | $14.95 |
| Rural postcodes: | $9.99 | $14.95 |
Orders over $79.00 qualify for free shipping.
How to return your order
At Booktopia, we offer hassle-free returns in accordance with our returns policy. If you wish to return an item, please get in touch with Booktopia Customer Care.
Additional postage charges may be applicable.
Defective items
If there is a problem with any of the items received for your order then the Booktopia Customer Care team is ready to assist you.
For more info please visit our Help Centre.
You Can Find This Book In

Cloud Native Application Protection Platforms
A Guide to CNAPPs and the Foundations of Comprehensive Cloud Security
Paperback
RRP $125.75
$60.99
OFF
This product is categorised by
- Non-FictionComputing & I.T.Computer Networking & CommunicationsNetwork Security
- Non-FictionComputing & I.T.Databases
- Non-FictionComputing & I.T.Computer Science
- Non-FictionComputing & I.T.Computer SecurityData Encryption
- Non-FictionComputing & I.T.Computer HardwareNetwork Hardware
- Non-FictionWarfare & Defence























