TY - BOOK ID - 64911779 TI - Guide to Computer Network Security PY - 2020 SN - 3030381412 3030381404 PB - Cham : Springer International Publishing : Imprint: Springer, DB - UniCat KW - Computer security. KW - Computer networks KW - Security measures. KW - Computer network security KW - Network security, Computer KW - Security of computer networks KW - Computer security KW - Computer privacy KW - Computer system security KW - Computer systems KW - Computers KW - Cyber security KW - Cybersecurity KW - Electronic digital computers KW - Protection of computer systems KW - Security of computer systems KW - Data protection KW - Security systems KW - Hacking KW - Protection KW - Security measures KW - Information storage and retrieval. KW - Data structures (Computer science). KW - Management information systems. KW - Computer science. KW - Computer communication systems. KW - Information Storage and Retrieval. KW - Data Storage Representation. KW - Management of Computing and Information Systems. KW - Computer Communication Networks. KW - Communication systems, Computer KW - Computer communication systems KW - Data networks, Computer KW - ECNs (Electronic communication networks) KW - Electronic communication networks KW - Networks, Computer KW - Teleprocessing networks KW - Data transmission systems KW - Digital communications KW - Electronic systems KW - Information networks KW - Telecommunication KW - Cyberinfrastructure KW - Electronic data processing KW - Network computers KW - Informatics KW - Science KW - Computer-based information systems KW - EIS (Information systems) KW - Executive information systems KW - MIS (Information systems) KW - Sociotechnical systems KW - Information resources management KW - Management KW - Information structures (Computer science) KW - Structures, Data (Computer science) KW - Structures, Information (Computer science) KW - File organization (Computer science) KW - Abstract data types (Computer science) KW - Distributed processing KW - Communication systems KW - Information storage and retrieval systems. KW - Information retrieval. KW - Computer architecture. KW - Computer networks. KW - IT Operations. KW - Management. KW - Architecture, Computer KW - Data retrieval KW - Data storage KW - Discovery, Information KW - Information discovery KW - Information storage and retrieval KW - Retrieval of information KW - Documentation KW - Information science KW - Information storage and retrieval systems KW - Automatic data storage KW - Automatic information retrieval KW - Automation in documentation KW - Data processing systems KW - Data storage and retrieval systems KW - Discovery systems, Information KW - Information discovery systems KW - Information processing systems KW - Information retrieval systems KW - Machine data storage and retrieval KW - Mechanized information storage and retrieval systems KW - Electronic information resources KW - Data centers KW - Digital libraries KW - Information organization KW - Information retrieval UR - https://www.unicat.be/uniCat?func=search&query=sysid:64911779 AB - This timely textbook presents a comprehensive guide to the core topics in cybersecurity, covering issues of security that extend beyond traditional computer networks to the ubiquitous mobile communications and online social networks that have become part of our daily lives. In the context of our growing dependence on an ever-changing digital ecosystem, this book stresses the importance of security awareness, whether in our homes, our businesses, or our public spaces. This fully updated new edition features new material on the security issues raised by blockchain technology, and its use in logistics, digital ledgers, payments systems, and digital contracts. Topics and features: Explores the full range of security risks and vulnerabilities in all connected digital systems Inspires debate over future developments and improvements necessary to enhance the security of personal, public, and private enterprise systems Raises thought-provoking questions regarding legislative, legal, social, technical, and ethical challenges, such as the tension between privacy and security Describes the fundamentals of traditional computer network security, and common threats to security Reviews the current landscape of tools, algorithms, and professional best practices in use to maintain security of digital systems Discusses the security issues introduced by the latest generation of network technologies, including mobile systems, cloud computing, and blockchain Presents exercises of varying levels of difficulty at the end of each chapter, and concludes with a diverse selection of practical projects Offers supplementary material for students and instructors at an associated website, including slides, additional projects, and syllabus suggestions This important textbook/reference is an invaluable resource for students of computer science, engineering, and information management, as well as for practitioners working in data- and information-intensive industries. ER -