Introduction to Computer Networks & Cybersecurity


Posted on by Ben Rothke

To use a boxing analogy, Introduction to Computer Networks and Cybersecurity is a  superheavyweight of a book, coming in at nearly 10 pounds and more than 1,300 pages. And there is hardly a networking or data security topic that is not detailed in this reference.

cs1

Today, nearly every piece of data that needs to be secured is in some way or another connected to a network. With that in mind, the book takes an integrated approach to networking and information security, appreciating how tightly coupled they are. The authors note that one can’t effectively secure data on a network without a detailed understanding of how networks operate, as well as how data flows over the underlying network.

Written by two academicians from Auburn University and meant to be used as a primary textbook for undergraduate and graduate classes, the book is nonetheless an effective guide for anyone who needs a comprehensive reference, from the higher-level details all the way to the packet-level minutiae of the core topics of network security.

The book’s six sections include 28 chapters that progress from the fundamentals of networks and security to detailed networks, systems, threats, vulnerabilities, applications, and much more. While the book is huge, a large part comprises highly detailed and effective illustrations so readers can visualize the specific concept or idea being discussed. Each chapter can be read as a self-contained section; each starts with goals, includes detailed text, and ends with concluding remarks, problems to ponder, and additional references.

The book is physically heavy and textually dense, with a comprehensive index. But for those looking for a reference whose scope covers the entire gamut of networks and information security, Introduction to Computer Networks and Cybersecurity is a knockout of a reference.

978-1466572133


Contributors
Ben Rothke

Senior Information Security Manager, Tapad

critical infrastructure data security security operations

Blogs posted to the RSAConference.com website are intended for educational purposes only and do not replace independent professional judgment. Statements of fact and opinions expressed are those of the blog author individually and, unless expressly stated to the contrary, are not the opinion or position of RSA Conference™, or any other co-sponsors. RSA Conference does not endorse or approve, and assumes no responsibility for, the content, accuracy or completeness of the information presented in this blog.


Share With Your Community

Related Blogs