Show simple item record

dc.contributor.authorWang, Jieen_us
dc.date.accessioned2025-04-21T01:27:48Z
dc.date.available2025-04-21T01:27:48Z
dc.date.issued2009en_us
dc.identifier.isbn978-3-540-79697-8en_us
dc.identifier.isbn978-3-540-79698-5en_us
dc.identifier.otherHPU2166388en_us
dc.identifier.urihttps://lib.hpu.edu.vn/handle/123456789/35651
dc.description.abstractPeople today are mcreasmgly relymg on pubhc computer networks to conduct bUSInessand take care of household needs. However, public networks may be insecurebecause data stored in networked computers or transmitted through networks canbe stolen, modified, or fabricated by malicious users. Thus, it is important to knowwhat securIty measures are aVaIlable and how to use them. Network securIty practreesare desIgned to prevent these potentIal problems. Network security, orIgmatedfrom meeting the needs of providing data confidentiality over public networks, hasgrown into a major academic discipline in both computer science and computerengineering, and also an important sector in the information industry.The goal of network securIty IS to gIve people the hberty of enJoymg computernetworks wIthout fear of compromlsmg theIr rIghts and mterests. Network secuntyaccomphshes thIs goal by provldmg confidentlahty, integrtty, non-repudIatIon,and availability of useful data that are transmitted in open networks or stored innetworked computers.Network securIty wIll remam an actIve research area for several reasons. FIrst,securIty measures that are effectIve today may no longer be effectIve tomorrowbecause of advancements and breakthroughs in computmg theory, algorIthms, andcomputer technologies. Second, after the known security problems are solved, othersecurity loopholes which were previously unknown may at some point be discoveredand exploited by attackers. Third, when new applications are developed or newtechnologIes are mvented, new securIty problems may also be created wIth them.Thus, network secunty IS meant to be a long lastmg scuffle between the offendersand the defenders.en_us
dc.format.extent391 p.en_us
dc.format.mimetypeapplication/pdf
dc.language.isoenen_us
dc.publisherSpringeren_us
dc.subjectInformation securityen_us
dc.subjectNetworkingen_us
dc.subjectNetwork securityen_us
dc.titleComputer Network Security Theory and Practiceen_us
dc.typeBooken_us
dc.size17.5 MBen_us
dc.departmentTechnologyen_us


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record