Nicolas Sklavos, Information Security Journal: A Global Perspective (April 2014)
"This book touches every corner of the topic of computer network and cybersecurity. It explains thoroughly the concept of network layers. There are detailed instructions and illustrations on the design of each network layer employing the newest Cisco technology. In addition, the book discusses the security issues in the context of computer networks. Then it presents different prevention algorithms and techniques, starting with cryptographic techniques. Firewalls, intrusion detection/prevention systems, authentication using hash, secure socket layer, virtual private network, and wireless network security are some of the security topics, which are described with real-life scenarios. The strength of the book lies in the fact that it also includes the recent and emerging Internet Engineering Task Force and Institute of Electrical and Electronic Engineers standards and drafts that govern computer network and security technologies. Both the Instructor and the students would be able to maintain an up-to-date knowledge on the state-of-the-art technologies regarding network security. ... The text book presents a comprehensive overview of the fundamental concepts as well as state-of-the-art technologies in computer networks and security in cyber domain. The modular structure of the book makes it easy to adapt it for a variety of programs, including computer engineering, computer science, computer networks, computer security, and security systems, with different student backgrounds."
Nazrul Islam, Farmingdale State College, New York, USA, Journal of Applied Security Research (January 2014)
"This book represents one of the most comprehensive overviews of computer security I have seen recently. The reader can quickly identify and learn about various cyber attacks, and become familiar with terminology of attacks, authentication, and protocols (chain of trust, phishing attacks, cross-site request forgery attacks, bonnet attacks, DNSSEC, DKIM, SNMP, …). ... The coupling of networking protocols and networks with their corresponding cybersecurity issues is a very good idea."
Milos Manic, University of Idaho, Idaho Falls, USA
"This book combines good technical details with higher-level insights designed to help the reader focus on the right things and to understand them sufficiently. ... an up-to-date and well-written book on an exciting area of computing that forms the foundation for our modern, connected lives."
Tim Watson, Cyber Security Centre, De Montfort University, Leicester, UK
"This book is an invaluable resource for students at all levels interested in computer cybersecurity. It also serves as an excellent reference in cybersecurity for professionals in this fast-evolving and critical field. This is an excellent text, content is very refreshing, informative, and easy to follow for students ranging from novice to advanced levels. It contains an impressive collection of up-to-date cybersecurity issues and analysis."
Simon Y. Foo, Florida State University, Tallahassee, USA
"... this book offers a full and comprehensive view of the state of the art on computer networks and cyber security issues and could serve as a sort of handbook for this area by providing clear and detailed explanations of the related various topics."
Huijun Gao, Institute of Intelligent Control and Systems, Harbin Institute of Technology, China
"Easy-to-read, current and very well-written text."
Jayantha Herath, St. Cloud State University, Minnesota, USA
"One cannot deal with cybersecurity without being familiar with networking (and systems and programming for that matter) but I cannot remember seeing them in the same book, especially treated at that level of detail."
Phil Janson, EPFL (Swiss Federal Institute of Technology, Lausanne), Switzerland
"Every chapter presents its own goals, giving the students the proper perspective. Identifying learning goals is the first step to proper learning. ... [This book] makes cybersecurity a concrete object that students can touch and feel, rather than just an abstract concept."
Alptekin Küpçü, Koç University, Istanbul, Turkey
"This book by Wu and Irwin is one-stop shopping for a book that covers introduction to computer networks and to network security. Based on their industrial experience the authors selected the most important topics of both areas and created a text that can be used to learn about issues of network security while catching up on necessary details of computer networks."
Aleksander Malinowski, Bradley University, Peoria, Illinois, USA
"I will recommend this book to any one that seeks to have in-depth knowledge in network security."
Inah Omoronyia, School of Computing Science, University of Glasgow, Scotland, UK
"A very flexible textbook, suitable for a number of different types of lectures."
Peter Palensky, Austrian Institute of Technology, Vienna
"This book provides valuable details of many key network protocols and algorithms that help the readers gain insight quickly. ... Examples and homework problems given in the book are highly valuable, considerably beneficial for the readers to better understand the materials covered."
Nian-Feng Tzeng, University of Louisiana, Lafayette, USA
"This is an excellent book to teach a course on network security. ... The material will prepare the students for exercising better protection in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation."
Shambhu Upadhyaya, University at Buffalo, The State University of New York, USA
"This is a fantastic and practical book that provides great introduction to computer networking technology and comprehensive treatment of cybersecurity. The scope of the book covers the technology widely used in today’s computers, Internet, and servers through practical examples. The book provides important insights into how to enjoy a better and secure Internet life–it is a must read."
Maria C. Yuang, National Chiao Tung University, Hsinchu, Taiwan
"Chapters dealing with cybersecurity are solidly rooted in modern computer networking technologies and are well situated in real interconnection scenarios. ... Concepts are introduced with a clear language and progressively explained with a satisfactory degree of accuracy without exceeding in formalism. This enables understanding cybersecurity principles with small effort and makes the book suitable also to readers with little or no specific background in this area. ... The coverage of topics is very comprehensive and well balanced to satisfy a large number of teaching and learning requirements through different possible selections of parts of the material presented."
Adriano Valenzano, CNR-IEIIT National Research Council, Italy
"It gives a complete treatment of the critical important field of computer networks and cybersecurity in a clear and methodical manner. ... The learning features are comprehensive, including the learning goals for each chapter, extensive examples to illustrate fundamental principles, numerous diagrams and illustrations to enhance the presentation, and a large number of end-of-chapter problems and questions to evaluate the student’s understanding of the chapters’ content."
Gerhard P. Hancke, University of Pretoria, South Africa
"This is the main strength of the bookit is specifically designed to be helpful to teach courses on networks and its security. It is student-oriented as well as instructor-orientedit makes the job of learning and teaching easier to the both sides."
Wojciech Mazurczyk, Warsaw University of Technology, Poland
"... stands out as a different book. ... This book can be adopted as a primary textbook for the undergraduate and the graduate classes in computer security. Even professionals working in the networking and security domain will find this book as an invaluable reference material. The strength of this book is its complete coverage of various layers of network layers from a security point of view."
Professor Tony Thomas, Ph.D., Indian Institute of Information Technology and Management, Kerala, India
"The authors seem to have struck the right balance between technical detail and descriptiveness. Without glossing over the operational aspects of the multitude of architectures and protocols they discuss, the authors manage to retain the holistic picture across all the communication-oriented layers of the ISO OSI Model. Numerous elaborate examples illustrate new concepts immediately after they are introduced, and guide the reader almost by hand in understanding ‘how stuff works’. Inclusion of wireless and mobile networking, network virtualization and cybersecurity makes the book truly state of the art. The last part that deals with cybersecurity is especially exciting and documents the authors' vast knowledge of information security, communication protocols and application-level programming alike."
Jerzy Konorski, Gdansk University of Technology, Poland
"To do something in the real world of networks, you need to understand the protocols in bit-by-bit, byte-by-byte level of details, as done in this book. I would also encourage my graduate students to read this book, since following through the book can guide the students to easily understand the networking protocols in a straightforward way as a software engineer and also as a network designer."
Lynn Choi, Korea University, Seoul, Korea