Introduction to Computer Networks and Cybersecurity / Edition 1

Introduction to Computer Networks and Cybersecurity / Edition 1

by Chwan-Hwa (John) Wu, J. David Irwin
ISBN-10:
1466572132
ISBN-13:
9781466572133
Pub. Date:
02/04/2013
Publisher:
Taylor & Francis
ISBN-10:
1466572132
ISBN-13:
9781466572133
Pub. Date:
02/04/2013
Publisher:
Taylor & Francis
Introduction to Computer Networks and Cybersecurity / Edition 1

Introduction to Computer Networks and Cybersecurity / Edition 1

by Chwan-Hwa (John) Wu, J. David Irwin
$240.0
Current price is , Original price is $240.0. You
$240.00 
  • SHIP THIS ITEM
    This item is available online through Marketplace sellers.
  • PICK UP IN STORE

    Your local store may have stock of this item.

$37.46 
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.

    • Condition: Good
    Note: Access code and/or supplemental material are not guaranteed to be included with used textbook.

Overview

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.

Get the Fundamentals of Internet Architecture and the Protocol Layers

Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks—through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion.

Learn about Malware and Security Systems

Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication.

Understand Cyber Attacks—and What You Can Do to Defend against Them

This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them.

Pedagogical Features

The book’s modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption.


Product Details

ISBN-13: 9781466572133
Publisher: Taylor & Francis
Publication date: 02/04/2013
Edition description: New Edition
Pages: 1336
Product dimensions: 8.90(w) x 11.20(h) x 2.10(d)

About the Author

Chwan-Hwa "John" Wu joined the faculty of Auburn University, Alabama, in 1987, and is currently a professor of electrical and computer engineering. He has been the principal investigator on research projects funded by NSF, the U.S. Army, NASA, USDA, and many companies, including Northrop Grumman and Lockheed Martin. His current research interests include cybersecurity. He is an author and co-author of two books, 58 journal papers, and more than 130 conference publications. He also holds five U.S. patents. Dr. Wu is a Fellow of the IEEE.

J. David Irwin joined Auburn University, Alabama, in 1969, and is currently the Earle C. Williams Eminent Scholar in the Electrical and Computer Engineering Department. He is the author or co-author of numerous publications, including 17 textbooks. He has held numerous positions within the IEEE, including president of both the Industrial Electronics and Education Societies, as well as editor-in-chief of the IEEE Transactions on Industrial Electronics. He is a Life Fellow of the IEEE and a Fellow of both the ASEE and the AAAS. He is the recipient of numerous education and technical awards.

Table of Contents

An Introduction to Information Networks. Applications: The Application Layer. DNS and Active Directory. XML-Based Web Services. Socket Programming. Peer-to-Peer (P2P) Networks and Applications. Link and Physical Layers: The Data Link Layer and Physical Layer. The Ethernet and Switches. Virtual LAN, Class of Service, and Multilayer Networks. Wireless and Mobile Networks. Network Layer: The Network Layer. IPv6. Routing and Interior Gateways. Border Gateway Routing. Transport Layer: The Transport Layer. Packet Loss Recovery. TCP Congestion Control. Cyber Security: Cyber Security Overview. Firewalls. Intrusion Detection/Prevention System. Hash and Authentication. Symmetric Key Ciphers and Wireless LAN Security. Public Key Cryptography, Infrastructure and Certificates. Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security. Virtual Private Networks for Network Layer Security. Network Access Control and Wireless Network Security. Cyber Threats and Their Defense. Emerging Technologies: Network and Information Infrastructure Virtualization. Unified Communications and Multimedia Protocols. Glossary of Acronyms. Index.

What People are Saying About This

From the Publisher

"This book represents one of the most comprehensive overviews of computer security I have seen recently. The reader can quickly identify and learn about various cyber attacks, and become familiar with terminology of attacks, authentication, and protocols (chain of trust, phishing attacks, cross-site request forgery attacks, bonnet attacks, DNSSEC, DKIM, SNMP, …). ... The coupling of networking protocols and networks with their corresponding cybersecurity issues is a very good idea."
—Milos Manic, University of Idaho, Idaho Falls, USA

"This book combines good technical details with higher-level insights designed to help the reader focus on the right things and to understand them sufficiently. ... an up-to-date and well-written book on an exciting area of computing that forms the foundation for our modern, connected lives."
—Tim Watson, Cyber Security Centre, De Montfort University, Leicester, UK

"This book is an invaluable resource for students at all levels interested in computer cybersecurity. It also serves as an excellent reference in cybersecurity for professionals in this fast-evolving and critical field. This is an excellent text, content is very refreshing, informative, and easy to follow for students ranging from novice to advanced levels. It contains an impressive collection of up-to-date cybersecurity issues and analysis."
—Simon Y. Foo, Florida State University, Tallahassee, USA

"... this book offers a full and comprehensive view of the state of the art on computer networks and cyber security issues and could serve as a sort of handbook for this area by providing clear and detailed explanations of the related various topics."
—Huijun Gao, Institute of Intelligent Control and Systems, Harbin Institute of Technology, China

"Easy-to-read, current and very well-written text."
—Jayantha Herath, St. Cloud State University, Minnesota, USA

"One cannot deal with cybersecurity without being familiar with networking (and systems and programming for that matter) but I cannot remember seeing them in the same book, especially treated at that level of detail."
—Phil Janson, EPFL (Swiss Federal Institute of Technology, Lausanne), Switzerland

"Every chapter presents its own goals, giving the students the proper perspective. Identifying learning goals is the first step to proper learning. ... [This book] makes cybersecurity a concrete object that students can touch and feel, rather than just an abstract concept."
—Alptekin Küpçü, Koç University, Istanbul, Turkey

"This book by Wu and Irwin is one-stop shopping for a book that covers introduction to computer networks and to network security. Based on their industrial experience the authors selected the most important topics of both areas and created a text that can be used to learn about issues of network security while catching up on necessary details of computer networks."
—Aleksander Malinowski, Bradley University, Peoria, Illinois, USA

"I will recommend this book to any one that seeks to have in-depth knowledge in network security."
—Inah Omoronyia, School of Computing Science, University of Glasgow, Scotland, UK

"A very flexible textbook, suitable for a number of different types of lectures."
—Peter Palensky, Austrian Institute of Technology, Vienna

"This book provides valuable details of many key network protocols and algorithms that help the readers gain insight quickly. ... Examples and homework problems given in the book are highly valuable, considerably beneficial for the readers to better understand the materials covered."
—Nian-Feng Tzeng, University of Louisiana, Lafayette, USA

"This is an excellent book to teach a course on network security. ... The material will prepare the students for exercising better protection in terms of understanding the motivation of the attackers and how to deal with and mitigate the situation."
—Shambhu Upadhyaya, University at Buffalo, The State University of New York, USA

"This is a fantastic and practical book that provides great introduction to computer networking technology and comprehensive treatment of cybersecurity. The scope of the book covers the technology widely used in today’s computers, Internet, and servers through practical examples. The book provides important insights into how to enjoy a better and secure Internet life–it is a must read."
—Maria C. Yuang, National Chiao Tung University, Hsinchu, Taiwan

"Chapters dealing with cybersecurity are solidly rooted in modern computer networking technologies and are well situated in real interconnection scenarios. ... Concepts are introduced with a clear language and progressively explained with a satisfactory degree of accuracy without exceeding in formalism. This enables understanding cybersecurity principles with small effort and makes the book suitable also to readers with little or no specific background in this area. ... The coverage of topics is very comprehensive and well balanced to satisfy a large number of teaching and learning requirements through different possible selections of parts of the material presented."
—Adriano Valenzano, CNR-IEIIT National Research Council, Italy

"It gives a complete treatment of the critical important field of computer networks and cybersecurity in a clear and methodical manner. ... The learning features are comprehensive, including the learning goals for each chapter, extensive examples to illustrate fundamental principles, numerous diagrams and illustrations to enhance the presentation, and a large number of end-of-chapter problems and questions to evaluate the student’s understanding of the chapters’ content."
—Gerhard P. Hancke, University of Pretoria, South Africa

From the B&N Reads Blog

Customer Reviews