Synopses & Reviews
Get the inside edge on the latest advances in the field of computer network security with the help of this new book! Comprehensive in scope, it is an essential guide to all facets of information security ranging from basic network technology to the broad applications of network security used in e-commerce, Internet security, and enterprise systems. Readers will learn about risk and threat analysis, as well as technologies such as access control, authentication, encryption and key distribution. Planning, installing, and operating a secure system is also covered. Highlights include lessons learned from September 11, 2001. Coverage concludes with a look at future trends, including global terror and proactive solutions.
Synopsis
- an excellent introduction for telecommunications, computer engineering technology, and IT students who desire to learn about the network security field
- relevant and up-to-date technologies promote awareness of the most current issues and concerns facing the future of information security
- expansive range of topics provides an exceptional overview of existing network issues so that readers can choose the special areas on which they want to focus
- easy-to-read content is applicable to CIS, MIS, and IT fields as well as telecommunications and electronics
About the Author
Gordon F. Snyder is the Executive Director and Principal Investigator for the National Center for Telecommunications Technologies at Springfield Technical Community College. He has taught in the telecommunications, electronics systems, computer systems, and laser electro-optics departments at STCC since 1984, and co-chaired those departments from 1990-1999. He helped develop the Verizon Next Step program and now serves as the New England telecommunications director for the Verizon Next Step Program. In 2001, he was selected as one of the top 15 technology faculty in the United States by the American Association of Community Colleges and Microsoft Corporation.
Table of Contents
Part One: Basic Computer Technology. Introduction - From Teleprocessing to Client Server Computing. Operating Systems and Applications. Networks and Networking. Part Two: Risk and Threat Analysis. Risk, Analysis, and Special Concerns. Part Three: The technology of Security. Access Control. Authentication. Encryption. PKI and Key Distribution. Security Devices and Software. Part Four: Network Security. Physical and Data Link Layer Security. Security at the Network Layer - Internet Security. Application Level Security. Part Five: Application and Service Supply Security. Security and E-commerce. Enterprise Systems and Solutions. The Telecommunications Industry. Part Six: Planning Secure Systems and Implementing Effective Solutions. Planning for Security. Design Aspects. Installation of a Secure System. Part Seven: Operating a Successful and Secure System. Operation and Support. Monitoring on Going Operation. Part Eight: The Future. Future Trends: Threats and Technologies.