没有合适的资源?快使用搜索试试~ 我知道了~
首页【2018新书】Computer and Network Security Essentials(计算机与网络安全精要)
资源详情
资源评论
资源推荐

Editor KevinDaimi
Associate Editors Guillermo Francia
Levent Ertaul · Luis Hernandez Encinas
Eman El-Sheikh
Computer
and Network
Security
Essentials

Computer and Network Security Essentials

Kevin Daimi
Editor
Computer and Network
Security Essentials
123

Editor
Kevin Daimi
University of Detroit Mercy
Detroit, MI, USA
Associate Editors
Guillermo Francia
Jacksonville State University, USA
Luis Hernandez Encinas
Institute of Physical and Information
Technologies (ITEFI), Spain
Levent Ertaul
California State University East Bay
USA
Eman El-Sheikh
University of West Florida, USA
ISBN 978-3-319-58423-2 ISBN 978-3-319-58424-9 (eBook)
DOI 10.1007/978-3-319-58424-9
Library of Congress Control Number: 2017943957
© Springer International Publishing AG 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, express or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
Printed on acid-free paper
This Springer imprint is published by Springer Nature
The registered company is Springer International Publishing AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Preface
The constantly increasing trend of cyber-attacks and global terrorism makes it vital
for any organization to protect and secure its network and computing infrastructure.
With the continuous progress the Internet is facing, companies need to keep up
by creating and implementing various software products and by utilizing advanced
network and system equipment that need to be protected against various attacks.
Data stored in our computers can also be subject to unauthorized access. Attackers
can modify our data, steal our critical information including personal information,
read and alter our e-mail messages, change program code, and possibly mess with
our photos including using them for wicked purposes. Intruders can also employ
our computers to attack other computers, websites, and networks without our
knowledge. By enforcing security of networks and other computing infrastructure,
the possibility of losing important data, privacy intrusion, and identity theft can
be countermeasured. Many professionals working in computer technology consider
security as an afterthought. They only take it seriously when a security problem
occurs. It is imperative that society should start accepting security as the new norm.
Computer and Network Security Essentials will introduce the readers to the
topics that they need to be aware of to be able to protect their IT resources
and communicate with security specialists in their own language when there is a
security problem. It introduces IT security to the public at large to improve their
security knowledge and perception. The book covers a wide range of security
topics including computer security, network security, cryptographic technologies,
biometrics and forensics, hardware security, security applications, and security
management. It introduces the concepts, techniques, methods, approaches, and
trends needed by security specialists to improve their security skills and capabilities.
Further, it provides a glimpse of future directions where security techniques,
policies, applications, and theories are headed. The book is a rich collection of
carefully selected and reviewed manuscripts written by diverse security experts in
the listed fields and edited by prominent security researchers.
v
University of Detroit Mercy, USA Kevin Daimi
剩余608页未读,继续阅读
















安全验证
文档复制为VIP权益,开通VIP直接复制

评论0