Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Guide to computer network security (4th ed.)
Kizza J., Springer International Publishing, New York, NY, 2017. 569 pp. Type: Book (978-3-319556-05-5)
Date Reviewed: Dec 14 2017

The fourth edition of this outstanding guide is fully revised, keeping in line with the latest technological developments of the computing ecosystem, which resulted from the removal of the logical boundaries between enterprise, mobile, wireless, and home networks, as well as the rapid extension and embedding process of social networks.

The detailed aspects, considerations, and recommendations in computer network security may be easily learned and completely available for immediate practical application. The comprehensive material is structured over six main parts and 26 chapters.

The first part includes two introductory chapters on computer networks and computer network security fundamentals, providing the reader with a strong knowledge base.

Part 2 is structured over five chapters dedicated to security issues and challenges in traditional computer networks. It analyzes security threats and their motives, network vulnerabilities, cybercrimes and hackers, scripting and security in networks, and security assessment and assurance.

Part 3 deals with computer network security challenges, treated over 13 chapters. Topics include disaster management, access control and authorization, authentication, cryptography, firewalls, viruses, computer and network forensics, security protocols, and security in wireless and sensor networks. There are proposed tools and techniques, software algorithms, currently used solutions, and best practices for computer network security environments.

Part 4 is dedicated to the emergence of the digital and social network ecosystem, emphasizing the latest technological achievements in virtualization technology and security, cloud computing security, and mobile systems security issues. A new chapter is dedicated to Internet of Things (IoT) challenges and its security quagmire.

Part 5 brings a new chapter on conquering and securing the last frontier in the digital invasion, the home front, with topics about changing home and network hotspots, as well as activities and threats in the home and the home local area network (LAN).

Part 6, with the last chapter, includes hands-on security projects arranged in four parts: case studies, weekly/biweekly laboratory assignments, semester projects, and research projects.

The guide is conceived to represent a full course and at the same time a toolbox reference, targeting a large public audience and specific objectives to be accomplished.

Primarily, the material attempts to educate readers about the rapidly evolving computing ecosystem. As the author underlines, the additional transformations produced inside and outside the networks, at the server level, resulted in a “virtualized and elastic network” widely expanding for all users’ needs.

Second, the guide presents the current computer network component characteristics and warns of their specific threats, vulnerabilities, and weaknesses; gaps in security design and implementation; cyber-attacks; and virus proliferation. The book includes specific presentations and proposals of the most effective security tools and techniques available for different computing platforms and software algorithms, as well as best-practice security solutions.

Third, it deals with current issues related to legislation, regulation, legal, social, technical, enforcement, and ethical security aspects for computing ecosystem security, and underlines the necessity for collective and individual security in all network types.

The targeted audience consists of two large groups. The first includes computer science and information technology (IT) students, as well as those in information management science, professors, and trainers specializing in teaching about computer networks and security aspects. The second group includes, among others, computer and mobile network administrators, network managers, cybersecurity engineers, security administrators, programmers in security software, and similar practitioners.

Each chapter includes two types of exercises, simple and advanced, for which answers reside in the related chapter text. The author also includes presentations on open-source software tools, making the guide more practically affordable than the high price of proprietary software.

The material may be structured and conceived as support for a one-semester (or more) course to be taught in computer and information science departments.

As additional book resources, there are provided hyperlinks for cryptographic and mobile security hands-on projects from two National Science Foundation (NSF)-funded workshops at the author’s university, as well as hyperlinks for instructor support materials at the publisher’s and respectively the author’s websites.

This is an outstanding reference for all computer network security professionals who need to acquire knowledge shared from the great experience of the author.

More reviews about this item: Amazon

Reviewer:  Mihail Sadeanu Review #: CR145706 (1802-0029)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy