• Complain

Bongsik Shin - A Practical Introduction to Enterprise Network and Security Management

Here you can read online Bongsik Shin - A Practical Introduction to Enterprise Network and Security Management full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Auerbach Publications, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    A Practical Introduction to Enterprise Network and Security Management
  • Author:
  • Publisher:
    Auerbach Publications
  • Genre:
  • Year:
    2017
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

A Practical Introduction to Enterprise Network and Security Management: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "A Practical Introduction to Enterprise Network and Security Management" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful professional career.A Practical Introduction to Enterprise Network and Security Management contains 12 chapters of the correct amount of coverage for a semester or quarter. It balances introductory and fairly advanced subjects on computer networking and cybersecurity to deliver effectively technical and managerial knowledge. It explains sometimes challenging concepts in a manner that students can follow with careful reading.A Practical Introduction to Enterprise Network and Security Management is designed to offer impactful, hands-on learning experiences without relying on a computer lab. First, each chapter comes with practical exercise questions. In the class setting, they are good as individual or group assignments. Many of them are based on simulated or real cases, and take advantage of actual industry products and systems for a reader to better relate theories to practice. Second, there are a number of information-rich screen shots, figures, and tables in each chapter carefully constructed to solidify concepts and thus enhance visual learning.A Practical Introduction to Enterprise Network and Security Management Is written for students studying management information systems, accounting information systems, or computer science in a semester of 15 to 16 weeks, and exposed to the subject for the first time Takes advantage of many real cases and examples, and actual industry products and services (software, hardware, and configurations) so that students can better relate concepts and theories to practice Explains subjects in a systematic, but very practical manner that students can follow through Provides students with practical understanding of both computer networking and cybersecurity Contains highly practical exercise questions, which can be individual or group assignments within or without the class, included in each chapter to reinforce learning.In addition to the thorough technical details, managerial issues including, enterprise network planning, design, and management from the practitioners perspective are embedded throughout the text to assist balanced learning. Bearing in mind of the critical importance of security in todays enterprise networks, the text discusses the implications of network design and management on enterprise security whenever appropriate. Lastly, to reinforce knowledge in security management further, two chapters introduce the fundamentals of cybersecurity in terms of threat types and defense techniques.

Bongsik Shin: author's other books


Who wrote A Practical Introduction to Enterprise Network and Security Management? Find out the surname, the name of the author of the book and a list of all author's works by series.

A Practical Introduction to Enterprise Network and Security Management — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "A Practical Introduction to Enterprise Network and Security Management" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

A Practical Introduction to Enterprise Network and Security Management A - photo 1

A Practical Introduction to Enterprise Network and Security Management

A Practical Introduction to Enterprise Network and Security Management

Bongsik Shin, Ph.D

CRC Press Taylor Francis Group 6000 Broken Sound Parkway NW Suite 300 Boca - photo 2

CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742

2017 by Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, an Informa business

No claim to original U.S. Government works

Printed on acid-free paper

International Standard Book Number-13: 978-1-4987-8797-0 (Hardback)

This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.

For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.

Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe.

Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com

and the CRC Press Web site at
http://www.crcpress.com

Contents

This book is written for those who study or practice information technology, management information systems (MIS), accounting information systems (AIS), or computer science (CS). It is assumed that readers are exposed to computer networking and security subjects for the first time. Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful professional career.

If used for a class, the book of 12 chapters contains just about right amount of coverage for a semester or quarter. It balances introductory and fairly advanced subjects on computer networking and cybersecurity to effectively deliver technical and managerial knowledge. Although the writing is moderately dense, utmost attempts have been made on explaining sometimes challenging concepts in a manner that readers can follow through, with careful reading.

The book is designed to offer impactful, hands-on learning experience without relying on a computer lab. First, each chapter comes with practical exercise questions. In the class setting, they are good as individual or group assignments. Many of them are based on simulated or real cases, and take advantage of actual industry products and systems for a reader to better relate theories to practice. Second, there are a number of information-rich screen shots, figures, and tables in each chapter carefully constructed to solidify concepts and thus enhance visual learning.

In addition to the thorough technical details, managerial issues including, enterprise network planning, design, and management are embedded throughout the book from the practitioners perspective to assist balanced learning. Besides, bearing in mind of the critical importance of security in todays enterprise networks, implications of network design and management on enterprise security are discussed whenever appropriate. Lastly, to further reinforce knowledge in security management, two chapters are dedicated to introduce fundamentals of cybersecurity in terms of threat types and defense techniques.

Bongsik Shin is a professor of management information systems at San Diego State University. He earned a Ph.D. from the University of Arizona and was an assistant professor at the University of Nebraska at Omaha before joining San Diego State University. He has taught computer network & cybersecurity management, business intelligence (data warehousing & data mining, statistics), decision support systems, electronic commerce, and IT management & strategy. Especially, he has been teaching computer networking and cybersecurity continuously over 20 years.

His academic activities in pursuit of teaching and research excellence have been funded by more than 25 internal and external grants. His recent research efforts have been all about cybersecurity on subjects related to cyber threat intelligence, ransomware, authentication & access control and countermeasures of phishing. Recently, his team, he as the principal investigator, has been awarded a grant by the US Department of Defense to conduct research on Actionable Intelligence-Oriented Cyber Threat Modeling.

He has published more than 30 articles in such high impact journals as MIS Quarterly; IEEE Transactions on Engineering Management; IEEE Transactions on Systems, Man, and Cybernetics; Communications of the ACM; Journal of Association for Information Systems; European Journal of Information Systems; Journal of Management Information Systems; Information Systems Journal; Information & Management; and Decision Support Systems. In 2016, he served as a conference co-chair of the Americas Conference on Information Systems, one of the three largest MIS conferences with attendees from 40+ countries.

By definition, the computer network represents a collection of wired and wireless communication links through which computers and other hardware devices exchange data (or messages). A network can be either as small as the one installed in a house or as big as the Internet that literally covers the entire planet. The size of a particular network, thus, reflects the size of the place (e.g., building, campus) where it is installed. In recent days, the wireless and wired network links have become the arteries of organizations (e.g., companies, universities) and the society, revolutionizing every facet of our life by facilitating resource (e.g., storage) sharing and exchange of data (e.g., texts, videos, music) in an unprecedented manner. Throughout this book, the two terms data and message are used synonymously.

Because of the rapid advancement of information and communication technologies (ICTs), more electronic and mobile devices are being attached to the computer network. Among them are digital smart phones, high-definition Internet protocol televisions (IPTVs), music and video game players, tablets such as iPads, electronic appliances, and control and monitoring systems (e.g., security cameras, closed-circuit televisions (CCTVs), traffic signals). The rapid increase of various digital devices is transforming the network into a more dynamic, diversified, and, at the same time, more vulnerable platform.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «A Practical Introduction to Enterprise Network and Security Management»

Look at similar books to A Practical Introduction to Enterprise Network and Security Management. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «A Practical Introduction to Enterprise Network and Security Management»

Discussion, reviews of the book A Practical Introduction to Enterprise Network and Security Management and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.