Автор: Joseph Migga Kizza
Издательство: Springer
Серия: Texts in Computer Science
Год: 2024
Страниц: 654
Язык: английский
Формат: pdf (true), epub
Размер: 27.7 MB
In the context of growing human dependence on a digital ecosystem, this book stresses the importance of security awareness—whether in homes, businesses, or public spaces. It also embraces the new and more agile and artificial-intelligence-boosted computing systems models, online social networks, and virtual platforms that are interweaving and fueling growth of an ecosystem of intelligent digital and associated social networks. This fully updated edition features new material on new and developing Artificial Intelligence (AI) models across all computing security systems spheres, blockchain technology, and the Metaverse, leading toward security systems virtualizations.
This guide is a comprehensive volume touching not only on every major topic in computing and information security and assurance realms, but also has gone beyond the security of computer networks as we used to know them, to embrace new and more agile and Artificial Intelligence boosted mobile systems, new online social networks and virtual platforms that are interweaving into our everyday fabric, if not already and creating an ever-growing ecosystem of intelligent digital and associated social networks. We bring into our ongoing discussion on computer network security, a broader view of the new ever-growing ecosystem of fixed, wireless, mobile, and virtual and online social networks. As with previous editions, it is intended to bring massive security awareness and education to the security realities of our time, a time when billions of people from the remotest place on earth to the most cosmopolitan world cities are using the smartest, smallest, and more powerful mobile devices loaded with the most fascinating and worrisome functionalities ever known to interconnect via a mesh of elastic computing networks in this ecosystem. We highlight security and privacy issues and concerns in public commons and private bedrooms as users around the globe intersect in this growing digital and social network ecosystem.
The volume is venturing into and exposing all sorts of known security problems, vulnerabilities, and the dangers likely to be encountered by the users of these devices. In its own way, it is a pathfinder as it initiates a conversation toward developing better tools, algorithms, protocols, and best practices that will enhance the security of systems in the public commons, private and enterprise offices, and living rooms and bedrooms where these devices are used. It does this comprehensively in five parts and twenty-eight chapters. Part I gives the reader an understanding of the working of and the security situation of the traditional computer networks. Part II builds on this knowledge and exposes the reader to the prevailing security situation based on a constantly evolving security threat. It surveys several security threats.
Part III, the largest, forms the core of the guide and presents to the reader most of the tools, algorithms, best practices, and solutions that are currently in use. Part IV goes beyond the traditional computer network as we used to know it to cover new systems and technologies that have seamlessly and stealthlessly extended the boundaries of the traditional computer network. Systems and other emerging technologies including virtualization, cloud computing, mobile systems, and blockchain technology are introduced and discussed. A new Part V ventures into wireless and other technologies creeping into the last mile creating a new security quagmire in the home computing environment and the growing home hotspots. Part VI, the last part, consists of projects.
The guide targets college students in Computer Science, information science, technology studies, library sciences, engineering, and to a lesser extent students in the arts and sciences who are interested in information technology. Since the guide covers a wide variety of security topics, tools, algorithms, solutions, and best practices, it is intended to be both a teaching and a reference toolbox for those interested in learning about the security of the evolving computing ecosystem. Learn about available techniques to prevent attacks on these systems.
Скачать Guide to Computer Network Security (6th Edition)