.

Friday, June 14, 2019

Network Security Annotated Bibliography Example | Topics and Well Written Essays - 4500 words

Network Security - Annotated Bibliography ExampleJacksons book of account takes a very detail approach to computer meshwork bail at all levels. It examines the importance of network security in organizations and the importance of protecting data. It further analyses the security requirements of an organization and how to meet the desired customer satisfaction by proving them with solutions that make economic sense and those that help protect their data. The classification of data into several states confidential, normal priority and life-sustaining, gives more light to the importance of having secure networks.The book does for a fact live up to the state of being a comprehensive reference to all issues related to auditing and network security. It covers all key argonas more or less network security and those relevant to information security. By and large this is a reliable source and a current source. It has been published in recent years, barely 2010, and as such the content is still within the valid bounds. This is because the information technology sector changes so fast and if the book was written any earliest the content therein could be to a large extent obsolete. The book further examines and projects the future of networking and specifically security in networks which gives it an edge over the sometime(prenominal) publications.The book by Jackson is based on facts and reports directly about network security. The research put into the book is objective and for this reason the reservoir has greatly minimized the personal accounts of the subject and opinion. It has well documented facts on security breaches from the worlds largest security devices manufacturers, for example, VeriSign. The author is highly certified person with specific certifications in lake herring equipment. He has a bachelors degree in business administration and has authored many whitepapers and initiate innovations of his own under CISCO systems. The source fits perfectly i nto the research and contains very relevant material to the course work. It is a specific source and does not explore the network security knit stitch as a general subject but rather squarely focuses on the nitty-gritty of securing computer networks. It helped narrow down my understanding of network security by providing me direction and grounds to be open minded and also recognize facts from fiction in network engineering. Harrington, Jan. Network security A operable approach. Massachusetts Morgan Kaufmann Publishers, 2005. Print. Probably this is the most incisive and educative book about networking security that has been written. In this book Harrington tears a part skills based network security and provides practical examples of network scenarios with security breaches. The constant reference to past security threats to known multinational companies serves as a vivid image of how critical this field is. Harrington gets into the mind of network security professionals and brings out the important role and task of network professionals, in the process she outlines the routine maintenance tasks and schedules necessary and that are required for network administrators. The book is a comprehensive resource for anyone who implements or plans to dive into network security field, including the practitioners and managers. The dual perspective on security how you call for to act in the network inside and how hackers and crackers view your network and want to get inside gives a solid understanding of the subject. Further, readers get hands-on technical advice they need to make it through the field without hustle. The Practical approach used in writing this book makes it a bit subjective since the author writes from his own experiences. However, these experiences have been supported by facts and history information on the subject of network security. The author is also a credible source and has been compose in numerous books. Harrington has written more than 30 book s and has been writing about computers since 1984. She has taught

No comments:

Post a Comment