Introduction to Computer Networks and Cybersecurity: A Comprehensive Guide for Beginners
Introduction to Computer Networks and Cybersecurity: A Comprehensive Guide for Beginners
If you want to learn the basics of computer networks and cybersecurity, you might be interested in reading Introduction to Computer Networks and Cybersecurity, a book by Chwan-Hwa (John) Wu and J. David Irwin. This book takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks.
IntroductionToComputerNetworksAndCybersecurityepub
This book covers the most important Internet applications and the methods used to develop them, the network edge and core, reliable transport and network congestion management, malware and security systems, emerging technologies such as virtualization and cloud computing, and more. It also uses a wealth of examples and illustrations to explain complicated concepts simply and clearly.
In this article, we will give you an overview of the book's main topics, features, and benefits. We will also show you how to download the epub version of the book for free.
What You Will Learn from This Book
This book is divided into six parts, each covering a different aspect of computer networks and cybersecurity. Here is a brief summary of what you will learn from each part:
Part 1: Internet Applications. This part introduces you to the most common Internet applications, such as web browsing, email, file transfer, remote login, voice over IP, streaming video, peer-to-peer networking, social networking, and online gaming. You will also learn how to develop your own Internet applications using sockets, HTTP, SMTP, FTP, Telnet, DNS, SIP, RTP, RTCP, BitTorrent, PNRP, Skype, Facebook API, and HTML5.
Part 2: Network Edge. This part discusses the network edge, which consists of hosts (such as computers, smartphones, tablets), access networks (such as DSL, cable modem, wireless LAN), local area networks (LANs), and physical media (such as twisted pair, coaxial cable, fiber optic). You will learn how hosts communicate with each other using Ethernet, wireless LAN protocols (such as 802.11), Bluetooth, cellular networks (such as 3G/4G/5G), WiMAX, satellite networks, RFID tags, NFC devices.
Part 3: Network Core. This part explores the network core, which consists of packet switches (such as routers), circuit switches (such as telephone switches), and the Internet backbone (such as Tier-1 ISPs). You will learn how packets are forwarded through the network using routing protocols (such as RIP, OSPF, BGP), switching techniques (such as store-and-forward switching, cut-through switching), multicast routing (such as IGMP), quality of service mechanisms (such as IntServ/DiffServ), network address translation (NAT), IPv6 transition technologies (such as ISATAP/Teredo).
Part 4: Reliable Transport. This part examines reliable transport protocols that ensure reliable data delivery between hosts over unreliable networks. You will learn how TCP provides reliable transport using connection establishment/termination,
flow control/congestion control/error control/windowing mechanisms,
segment structure/header fields/options/flags,
TCP variants/improvements (such as Tahoe/Reno/New Reno/SACK/Cubic),
and TCP performance analysis. You will also learn how UDP provides unreliable transport for real-time applications such as voice/video streaming.
Part 5: Cybersecurity. This part delves into cybersecurity mechanisms that protect networks and applications from cyber attacks. You will learn about the types of malware (such as viruses/worms/Trojans/rootkits/botnets/ransomware) and the security systems that detect/prevent/mitigate them (such as antivirus software/firewalls/intrusion detection systems/intrusion prevention systems). You will also learn about cryptography (such as symmetric/asymmetric encryption/hash functions/digital signatures/public key infrastructure/certificates) and its applications in network security (such as SSL/TLS/HTTPS/IPsec/VPN).
Part 6: Emerging Technologies. This part looks at emerging technologies that are changing the landscape of computer networks and cybersecurity. You will learn about virtualization (such as hypervisors/virtual machines/containers/Docker/Kubernetes) and its benefits for network management/scalability/security/isolation. You will also learn about data center and cloud e0e6b7cb5c