Wednesday, October 16, 2019
Network Security Annotated Bibliography Example | Topics and Well Written Essays - 4500 words
Network Security - Annotated Bibliography Example Jacksonââ¬â¢s book takes a very specific approach to computer network security at all levels. It examines the importance of network security in organizations and the importance of protecting data. It further analyses the security requirements of an organization and how to meet the desired customer satisfaction by proving them with solutions that make economic sense and those that help protect their data. The classification of data into several states; confidential, normal priority and critical, gives more light to the importance of having secure networks. The book does for a fact live up to the state of being a comprehensive reference to all issues related to auditing and network security. It covers all key areas around network security and those relevant to information security. By and large this is a reliable source and a current source. It has been published in recent years, precisely 2010, and as such the content is still within the valid bounds. This is because the information technology sector changes so fast and if the book was written any earlier the content therein could be to a large extent obsolete. The book further examines and projects the future of networking and specifically security in networks which gives it an edge over the past publications. The book by Jackson is based on facts and reports directly about network security. The research put into the book is objective and for this reason the author has greatly minimized the personal accounts of the subject and opinion. It has well documented facts on security breaches from the worldââ¬â¢s largest security devices manufacturers, for example, VeriSign. The author is highly certified person with specific certifications in CISCO equipment. He has a bachelorââ¬â¢s degree in business administration and has authored many whitepapers and initiate innovations of his own under CISCO systems. The source fits perfectly into the research and contains very relevant material to the course work. It is a specific source and does not explore the network security field as a general subject but rather squarely focuses on the nitty-gritty of securing computer networks. It helped narrow down my understanding of network security by providing me direction and grounds to be open minded and a lso recognize facts from fiction in network engineering. Harrington, Jan. Network security: A Practical approach. Massachusetts: Morgan Kaufmann Publishers, 2005. Print. Probably this is the most incisive and educative book about networking security that has been written. In this book Harrington tears a part skills based network security and provides practical examples of network scenarios with security breaches. The constant reference to past security threats to known multinational companies serves as a vivid image of how critical this field is. Harrington gets into the mind of network security professionals and brings out the important role and task of network professionals, in the process she outlines the routine maintenance tasks and schedules necessary and that are required for network administrators. The book is a comprehensive resource for anyone who implements or plans to dive into network security field, including the practitioners and managers. The dual perspective on secu rity: how you need to act in the network inside and how hackers and crackers view your network and want to get inside gives a solid understanding of the subject. Further, readers get hands-on technical advice they need to make it through the field without hustle. The Practical approach used in writing this book makes it a bit subjective since the author writes from his own experiences. However, these experiences have been supported by facts and history information on the subject of network security. The author is also a credible source and has been referenced in numerous books. Harrington has written more than 30 books and has been writing about computers since 1984. She has taught
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.