website statistics Computer Network Security and Cyber Ethics - PDF Books Online
Hot Best Seller

Computer Network Security and Cyber Ethics

Availability: Ready to download

The number of people who use computer systems rose dramatically during the 1990s. This practical guide presents an in-depth discussion of security and ethics in the new world of cyberspace.


Compare

The number of people who use computer systems rose dramatically during the 1990s. This practical guide presents an in-depth discussion of security and ethics in the new world of cyberspace.

7 review for Computer Network Security and Cyber Ethics

  1. 4 out of 5

    Clare O'Beara

    This is a practical short book about the internet and security. The start is rather slow as we get a discussion on what ethics are. After that we learn about networks from the ground up, with helpful simple diagrams of a token ring of computers, where a router and switch fit in a server network, where the firewall should be and more. I like the dissection of different kinds of attack on a system and how to prevent them. DDOS and malware, backdoor, laptop theft, password cracking and so on. More This is a practical short book about the internet and security. The start is rather slow as we get a discussion on what ethics are. After that we learn about networks from the ground up, with helpful simple diagrams of a token ring of computers, where a router and switch fit in a server network, where the firewall should be and more. I like the dissection of different kinds of attack on a system and how to prevent them. DDOS and malware, backdoor, laptop theft, password cracking and so on. More could have been said, obviously, because as the author points out we keep building a better hacker. Systems for security tend to be either preventative or reactive. The book does feel a little dated now because we now have the Internet of Things but the principles are the same, for instance Bluetooth needs to be an approved version with encoding and security. We are told that when a virus is present the anti-virus checkers are looking for: a known piece of code in a known virus, like a signature. A difference in the length of the program code. A difference in the number generated if you add all the binary digits that should be in the program code. This is called a checksum. Even if you do not plan on using computers for a living, it is great to know how they work and how the antivirus programs work. This book will make the reader more aware of security. At the end we get a summary of reporting of computer crime possible legislation and cyber crime units that are needed. Then some questions for class discussion. I noticed the odd misspelling like 'detectoin'. Notes P201 - 204. References 205 - 207. Index 209 - 213. I counted three names which I could be sure were female. I borrowed this book from the Dublin Business School Library. This is an unbiased review.

  2. 4 out of 5

    Caitlin

  3. 4 out of 5

    Jovany Agathe

  4. 5 out of 5

    McFarland

  5. 4 out of 5

    Liorz1

  6. 5 out of 5

    R. Araceli

  7. 5 out of 5

    Mariub Olafsen

Add a review

Your email address will not be published. Required fields are marked *

Loading...
We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.