If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.
Get the Fundamentals of Internet Architecture and the Protocol Layers
Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks—through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion.
Learn about Malware and Security Systems
Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication.
Understand Cyber Attacks—and What You Can Do to Defend against Them
This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them.
The book’s modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption.
Table of Contents
Chapter 1 - The Application Layer
Chapter 2 - DNS and Active Directory
Chapter 3 - XML-Based Web Services
Chapter 4 - Socket Programming
Chapter 5 - Peer-to-Peer (P2P) Networks and Applications
Chapter 6 - The Data Link Layer and Physical Layer
Chapter 7 - The Ethernet and Switches
Chapter 8 - Virtual LAN, Class of Service, and Multilayer Networks
Chapter 9 - Wireless and Mobile Networks
Chapter 10 - The Network Layer
Chapter 11 - IPv6
Chapter 12 - Routing and Interior Gateways
Chapter 13 - Border Gateway Routing
Chapter 14 - The Transport Layer
Chapter 15 - Packet Loss Recovery
Chapter 16 - TCP Congestion Control
Chapter 17 - Cybersecurity Overview
Chapter 18 - Firewalls
Chapter 19 - Intrusion Detection/Prevention System
Chapter 20 - Hash and Authentication
Chapter 21 - Symmetric Key Ciphers and Wireless LAN Security
Chapter 22 - Public Key Cryptography, Infrastructure and Certificates
Chapter 23 - Secure Socket Layer/Transport Layer Security (SSL/TLS) Protocols for Transport Layer Security
Chapter 24 - Virtual Private Networks for Network Layer Security
Chapter 25 - Network Access Control and Wireless Network Security
Chapter 26 - Cyber Threats and Their Defense
Chapter 27 - Network and Information Infrastructure Virtualization
Chapter 28 - Unified Communications and Multimedia Protocols