您好,欢迎来到聚文网。 登录 免费注册
网络安全基础/应用与标准(第4版)(大学计算机教育国外著名教材系列(影印版))

网络安全基础/应用与标准(第4版)(大学计算机教育国外著名教材系列(影印版))

  • 出版社: 清华大学出版社
  • 作者: 斯托林斯(WilliamStallings) 著
  • 出版日期: 2010-07-01
  • 商品条码: 9787302229728
  • 版次: 1
  • 页数: 0
  • 出版年份: 2010
定价:¥46 销售价:登录后查看价格  ¥{{selectedSku?.salePrice}} 
库存: {{selectedSku?.stock}} 库存充足
{{item.title}}:
{{its.name}}
精选
编辑推荐
《网络安全基础:应用与标准(第4版)(影印版)》:大学计算机教育国外有名教材系列
内容简介
《网络安全基础:应用与标准(第4版)(影印版)》由有名作者WilliamStallillgs编写,以当今网络安全的实际解决方案为基础,既简明扼要,又全面系统地介绍了网络安全的主要内容,包括基本原理、重要技术、主要方法和重要的工业标准等。全书共包含11章。除靠前章引言外,其余各章分为三大部分叙述:靠前部分是密码学,重点介绍分组密码、流密码、消息认证码、安全杂凑函数、公钥密码和数字签名等的基本原理、主要方法和重要应用场景等,并简要介绍了几种常用的典型算法,包括DES算法、AES算法、RC4算法和RSA算法等;第二部分是网络安全应用,简要介绍了传输层安全中的SSL/TLS协议、无线局域网安全及WAP协议、电子邮件安全与PGP与S/MIME协议;IP层安全与IPsec协议等。第三部分是系统安全,简要介绍了入侵检测与口令管理、恶意软件与防火墙等。
《网络安全基础:应用与标准(第4版)(影印版)》以近期新和实用的网络安全知识为主题,采用深入浅出的叙述手法,每章末尾还给出一定的推荐读物和思考练习题。因此,《网络安全基础:应用与标准(第4版)(影印版)》既是高等学校网络安全基础课程的好教材,也是工程技术人员和网络爱好者了解网络安全基本概貌的好读物。
作者简介
作者:(美国)斯托林斯(WilliamStallings)
目录
Prefaceix
AbouttheAuthorxiv
Chapter1Introduction1
1.1ComputerSecurityConcepts3
1.2TheOSISecurityArchitecture8
1.3SecurityAttacks9
1.4SecurityServices13
1.5SecurityMechanisms16
1.6AModelforNetworkSecurity19
1.7Standards21
1.8OutlineofThisBook21
1.9RecommendedReading22
1.10InternetandWebResources23
1.11KeyTerms,ReviewQuestions,andProblems25

PARTONECRYPTOGRAPHY27
Chapter2SymmetricEncryptionandMessageConfidentiality27
2.1SymmetricEncryptionPrinciples28
2.2SymmetricBlockEncryptionAlgorithms34
2.3RandomandPseudorandomNumbers42
2.4StreamCiphersandRC445
2.5CipherBlockModesofOperation50
2.6RecommendedReadingandWebSites55
2.7KeyTerms,ReviewQuestions,andProblems56

Chapter3Public-KeyCryptographyandMessageAuthentication61
3.1ApproachestoMessageAuthentication62
3.2SecureHashFunctions67
3.3MessageAuthenticationCodes73
3.4Public-KeyCryptographyPrinciples79
3.5Public-KeyCryptographyAlgorithms83
3.6DigitalSignatures90
3.7RecommendedReadingandWebSites90
3.8KeyTerms,ReviewQuestions,andProblems91

PARTTWONETWORKSECURITYAPPLICATIONS97
Chapter4KeyDistributionandUserAuthentication97
4.1SymmetricKeyDistributionUsingSymmetricEncryption98
4.2Kerberos99
4.3KeyDistributionUsingAsymmetricEncryption114
4.4X.509Certificates116
4.5Public-KeyInfrastructure124
4.6FederatedIdentityManagement126
4.7RecommendedReadingandWebSites132
4.8KeyTerms,ReviewQuestions,andProblems133

Chapter5Transport-LevelSecurity139
5.1WebSecurityConsiderations140
5.2SecureSocketLayerandTransportLayerSecurity143
5.3TransportLayerSecurity156
5.4HTTPS160
5.5SecureShell(SSH)162
5.6RecommendedReadingandWebSites173
5.7KeyTerms,ReviewQuestions,andProblems173

Chapter6WirelessNetworkSecurity175
6.1IEEE802.11WirelessLANOverview177
6.2IEEE802.11iWirelessLANSecurity183
6.3WirelessApplicationProtocolOverview197
6.4WirelessTransportLayerSecurity204
6.5WAPEnd-to-EndSecurity214
6.6RecommendedReadingandWebSites217
6.7KeyTerms,ReviewQuestions,andProblems218

Chapter7ElectronicMailSecurity221
7.1PrettyGoodPrivacy222
7.2S/MIME241
7.3DomainKeysIdentifiedMail257
7.4RecommendedReadingandWebSites264
7.5KeyTerms,ReviewQuestions,andProblems265
Appendix7ARadix-64Conversion266

Chapter8IPSecurity269
8.1IPSecurityOverview270
8.2IPSecurityPolicy276
8.3EncapsulatingSecurityPayload281
8.4CombiningSecurityAssociations288
8.5InternetKeyExchange292
8.6CryptographicSuites301
8.7RecommendedReadingandWebSites302
8.8KeyTerms,ReviewQuestions,andProblems303

PARTTHREESYSTEMSECURITY305
Chapter9Intruders305
9.1Intruders307
9.2IntrusionDetection312
9.3PasswordManagement323
9.4RecommendedReadingandWebSites333
9.5KeyTerms,ReviewQuestions,andProblems334
Appendix9ATheBase-RateFallacy337

Chapter10MaliciousSoftware340
10.1TypesofMaliciousSoftware341
10.2Viruses346
10.3VirusCountermeasures351
10.4Worms356
10.5DistributedDenialofServiceAttacks365
10.6RecommendedReadingandWebSites370
10.7KeyTerms,ReviewQuestions,andProblems371

Chapter11Firewalls374
11.1TheNeedforFirewalls375
11.2FirewallCharacteristics376
11.3TypesofFirewalls378
11.4FirewallBasing385
11.5FirewaULocationandConfigurations388
11.6RecommendedReadingandWebSite393
11.7KeyTerms,ReviewQuestions,andProblems394

APPENDICES398
AppendixASomeAspectsofNumberTheory398
A.1PrimeandRelativelyPrimeNumbers399
A.2ModularArithmetic401
AppendixBProjectsforTeachingNetworkSecurity403
B.1ResearchProjects404
B.2HackingProject405
B.3ProgrammingProjects405
B.4LaboratoryExercises406
B.5PracticalSecurityAssessments406
B.6WritingAssignments406
B.7Reading/ReportAssignments407
Index408
ONLINECHAPTERS

Chapter12NetworkManagementSecurity
12.1BasicConceptsofSNMP
12.2SNMPvlCommunityFacility
12.3SNMPv3
12.4RecommendedReadingandWebSites
12.5KeyTerms,ReviewQuestions,andProblems

Chapter13LegalandEthicalAspects
13.1CybercrimeandComputerCrime
13.2IntellectualProperty
13.3Privacy
13.4EthicalIssues
13.5RecommendedReadingandWebSites
13.6KeyTerms,ReviewQuestions,andProblems
ONLINEAPPENDICES
AppendixCStandardsandStandards-SettingOrganizations
C.1TheImportanceofStandards
C.2InternetStandardsandtheInternetSociety
C.3NationalInstituteofStandardsandTechnology
AppendixDTCP/IPandOSI
D.1ProtocolsandProtocolArchitectures
D.2TheTCP/IPProtocolArchitecture
D.3TheRoleofanInternetProtocol
D.4IPv4
D.5IPv6
D.6TheOSIProtocolArchitecture
AppendixEPseudorandomNumberGeneration
E.1PRNGRequirements
E.2PRNGUsingaBlockCipher
E.3PRNGUsingaHashFunctionorMessageAuthenticationCode
AppendixFKerberosEncryptionTechniques
E1Password-to-KeyTransformation
E2PropagatingCipherBlockChainingMode
AppendixGDataCompressionUsingZIP
G.1CompressionAlgorithm
G.2DecompressionAlgorithm
AppendixHPGPRandomNumberGeneration
H.1TrueRandomNumbers
H.2PseudorandomNumbers
AppendixITheInternationalReferenceAlphabet
Glossary
References

蜀ICP备2024047804号

Copyright 版权所有 © jvwen.com 聚文网