Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Guide to computer network security (3rd ed.)
Kizza J., Springer Publishing Company, Incorporated, New York, NY, 2015. 545 pp. Type: Book (978-1-447166-53-5)
Date Reviewed: Aug 19 2015

Computer network security is a hot topic these days due to the proliferation of computer networks and their vulnerability to attacks. This book is a part of Springer’s “Computer Communications and Networks” series. The first edition was published in 2009 and had 22 chapters, the second edition in 2013 had 24 chapters, and the current third edition has 25 chapters. The difference in content between the second and third editions is not substantial; the chapter titles are essentially the same (except for the addition of a new chapter, “Conquering the Last Frontier in the Digital Invasion”).

The book contains exercises and advanced exercises, along with relevant references, and comes with support materials for instructors, such as a syllabus, slides, answers to selected exercises, lab exercises, and projects, making it useful for teaching courses on computer security. It is divided into six parts.

The first part covers the fundamentals of computer networks and computer network security.

Part 2 focuses on security issues and challenges in computer networks. These include security threats, vulnerabilities, cybercrimes and hacking, the dangers of scripting languages (especially in web browsers), and mechanisms for assessing security, analyzing threats, and providing assurance.

The third part deals with the security challenges of computer networks. Techniques for managing disasters, enforcing access control and implementing authorization and authentication, cryptographic mechanisms, the benefits of firewalls, detecting intrusions and preventing them, forensics for computers and networks, filtering viruses and malicious content, evaluating products in terms of security, protocols for computer network security, ensuring security in wireless networks and devices, security issues in sensor networks, and other ongoing efforts in data security are discussed.

Part 4 concentrates on recent developments in cloud computing and security issues that pertain to it, security challenges due to virtualization software, and security issues pertaining to mobile devices.

The fifth part consists of just one chapter on threats to home networks.

The last part (6) focuses entirely on hands-on projects. These include weekly or biweekly lab assignments, semester projects, and research projects.

The book is well written and current. The exercises and projects are helpful for teaching. The first edition was praised in a review [1], and I believe the third edition will continue to receive praise from students, researchers, and practitioners. I strongly recommend it.

Reviewer:  S. V. Nagaraj Review #: CR143702 (1511-0919)
1) Neumann, W. T. Review of Guide to computer network security (1st ed.), by J. Kizza. Computing Reviews (May 6, 2009), CR Rev. No. 136789 (1003-0213).
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (C.2.0 ... )
 
 
Security and Protection (K.6.5 )
 
 
Reference (A.2 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy