没有合适的资源?快使用搜索试试~ 我知道了~
资源推荐
资源详情
资源评论
Editor KevinDaimi
Associate Editors Guillermo Francia
Levent Ertaul · Luis Hernandez Encinas
Eman El-Sheikh
Computer
and Network
Security
Essentials
Computer and Network Security Essentials
Kevin Daimi
Editor
Computer and Network
Security Essentials
123
Editor
Kevin Daimi
University of Detroit Mercy
Detroit, MI, USA
Associate Editors
Guillermo Francia
Jacksonville State University, USA
Luis Hernandez Encinas
Institute of Physical and Information
Technologies (ITEFI), Spain
Levent Ertaul
California State University East Bay
USA
Eman El-Sheikh
University of West Florida, USA
ISBN 978-3-319-58423-2 ISBN 978-3-319-58424-9 (eBook)
DOI 10.1007/978-3-319-58424-9
Library of Congress Control Number: 2017943957
© Springer International Publishing AG 2018
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or
the editors give a warranty, express or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
Printed on acid-free paper
This Springer imprint is published by Springer Nature
The registered company is Springer International Publishing AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface
The constantly increasing trend of cyber-attacks and global terrorism makes it vital
for any organization to protect and secure its network and computing infrastructure.
With the continuous progress the Internet is facing, companies need to keep up
by creating and implementing various software products and by utilizing advanced
network and system equipment that need to be protected against various attacks.
Data stored in our computers can also be subject to unauthorized access. Attackers
can modify our data, steal our critical information including personal information,
read and alter our e-mail messages, change program code, and possibly mess with
our photos including using them for wicked purposes. Intruders can also employ
our computers to attack other computers, websites, and networks without our
knowledge. By enforcing security of networks and other computing infrastructure,
the possibility of losing important data, privacy intrusion, and identity theft can
be countermeasured. Many professionals working in computer technology consider
security as an afterthought. They only take it seriously when a security problem
occurs. It is imperative that society should start accepting security as the new norm.
Computer and Network Security Essentials will introduce the readers to the
topics that they need to be aware of to be able to protect their IT resources
and communicate with security specialists in their own language when there is a
security problem. It introduces IT security to the public at large to improve their
security knowledge and perception. The book covers a wide range of security
topics including computer security, network security, cryptographic technologies,
biometrics and forensics, hardware security, security applications, and security
management. It introduces the concepts, techniques, methods, approaches, and
trends needed by security specialists to improve their security skills and capabilities.
Further, it provides a glimpse of future directions where security techniques,
policies, applications, and theories are headed. The book is a rich collection of
carefully selected and reviewed manuscripts written by diverse security experts in
the listed fields and edited by prominent security researchers.
v
University of Detroit Mercy, USA Kevin Daimi
剩余608页未读,继续阅读
资源评论
求志达道
- 粉丝: 65
- 资源: 200
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- STM32单片机FPGA毕设电路原理论文报告一种具有传统中医针刺补泻手法的新型智能电针仪设计
- 2023-04-06-项目笔记 - 第七十七阶段 - 4.4.2.75全局变量的作用域-75 -2024.03.19
- VuforiaObjectScanner-8-3-8.apk.1.1.1
- 上下班打卡_日报_20240201-20240319.xlsx
- 创业天下3.5.500.apk
- POD-data.mat
- ZF逆变器课程电子档及源码
- FileZilla-3.66.5-win64-sponsored2-setup
- SourceTreeSetup-3.4.17
- Docker Desktop Installer
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功