Title
Introduction to Computer Networks and Cybersecurity,New
Delivery time: 8-12 business days (International)
If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This fullcolor book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues.Get the Fundamentals of Internet Architecture and the Protocol LayersOrganized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networksthrough the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion.Learn about Malware and Security SystemsBuilding on the concepts and principles, the book then delves into stateoftheart cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an addon feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication.Understand Cyber Attacksand What You Can Do to Defend against ThemThis comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them.Pedagogical FeaturesThe books modular design offers exceptional flexibility, whether you want to use it for quick reference, selfstudy, or a wide variety of one or twosemester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and endofchapter problems and questions test your understanding. Throughout, the book uses realworld examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint animations, are available to instructors with qualifying course adoption.
By changing our most important processes and
products, we have already made a big leap forward. This ranges from the
increased use of more sustainable fibers to the use of more
environmentally friendly printing processes to the development of
efficient waste management in our value chain.
⚠️ WARNING (California Proposition 65):
This product may contain chemicals known to the State of California to cause cancer, birth defects, or other reproductive harm.
For more information, please visit www.P65Warnings.ca.gov.
Shipping & Returns
Shipping
We ship your order within 2–3 business days for USA deliveries and 5–8 business days for international shipments. Once your package has been dispatched from our warehouse, you'll receive an email confirmation with a tracking number, allowing you to track the status of your delivery.
Returns
To facilitate a smooth return process, a Return Authorization (RA) Number is required for all returns. Returns without a valid RA number will be declined and may incur additional fees. You can request an RA number within 15 days of the original delivery date. For more details, please refer to our Return & Refund Policy page.
Shipping & Returns
Shipping
We ship your order within 2–3 business days for USA deliveries and 5–8 business days for international shipments. Once your package has been dispatched from our warehouse, you'll receive an email confirmation with a tracking number, allowing you to track the status of your delivery.
Returns
To facilitate a smooth return process, a Return Authorization (RA) Number is required for all returns. Returns without a valid RA number will be declined and may incur additional fees. You can request an RA number within 15 days of the original delivery date. For more details, please refer to our Return & Refund Policy page.
Warranty
We provide a 2-year limited warranty, from the date of purchase for all our products.
If you believe you have received a defective product, or are experiencing any problems with your product, please contact us.
This warranty strictly does not cover damages that arose from negligence, misuse, wear and tear, or not in accordance with product instructions (dropping the product, etc.).
Warranty
We provide a 2-year limited warranty, from the date of purchase for all our products.
If you believe you have received a defective product, or are experiencing any problems with your product, please contact us.
This warranty strictly does not cover damages that arose from negligence, misuse, wear and tear, or not in accordance with product instructions (dropping the product, etc.).
Secure Payment
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.
We accept payments with :
Visa, MasterCard, American Express, Paypal, Shopify Payments, Shop Pay and more.
Secure Payment
Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.
We accept payments with :
Visa, MasterCard, American Express, Paypal, Shopify Payments, Shop Pay and more.
Related Products
You may also like
Frequently Asked Questions
- Q: What is the main focus of 'Introduction to Computer Networks and Cybersecurity'? A: The book integrates networking and cybersecurity, emphasizing their interconnections to help readers understand modern network design and security issues.
- Q: Who is the author of this book? A: The book is authored by Wu, Chwan-Hwa (John), who brings expertise in computer networks and cybersecurity.
- Q: How is the book structured? A: The book is organized into six parts, covering topics from Internet architecture and network fundamentals to cybersecurity mechanisms and emerging technologies.
- Q: What educational features does the book offer? A: It includes learning goals in each chapter, end-of-chapter problems, and real-world examples to enhance understanding of complex concepts.
- Q: Is this book suitable for self-study? A: Yes, the modular design and clear explanations make it ideal for self-study, quick reference, or use in various courses.
- Q: What topics are covered in the cybersecurity section? A: The cybersecurity section reviews malware types, security systems like firewalls, and provides insights into integrated security mechanisms.
- Q: How many pages does the book have? A: The book contains 1336 pages of comprehensive information on computer networks and cybersecurity.
- Q: What is the binding type of this book? A: This book is bound in hardcover, ensuring durability for frequent use.
- Q: When was 'Introduction to Computer Networks and Cybersecurity' published? A: The book was published on February 4, 2013.
- Q: What edition is this book? A: This is the first edition of 'Introduction to Computer Networks and Cybersecurity'.