Computer Network Security:Theory And Practice(英文版)
¥
17.38
3.6折
¥
48
九品
仅1件
作者[美]王杰 著
出版社高等教育出版社
出版时间2008-09
版次1
装帧平装
货号A10
上书时间2024-12-09
商品详情
- 品相描述:九品
图书标准信息
-
作者
[美]王杰 著
-
出版社
高等教育出版社
-
出版时间
2008-09
-
版次
1
-
ISBN
9787040241624
-
定价
48.00元
-
装帧
平装
-
开本
16开
-
纸张
胶版纸
-
页数
384页
-
字数
430千字
-
正文语种
英语
- 【内容简介】
-
《ComputerNetworkSecurity:TheoryAndPractice》introducestothereaderacompleteandconciseviewofnetworksecurity.Itprovidesin-depththeoreticalcoverageofrecentadvancementsandpracticalsolutionstonetworksecuritythreats.Thisbookcanbeusedforaone-semesternetworksecuritycourseforgraduateandupper-levelundergraduatestudents,aswellasareferenceforITprofessionals.
Dr.WanghasbeenProfessorofComputerScienceattheUniversityofMassachusettsLowellsince2001,DirectorofitsCenterforNetworkandInformationSecuritysince2004,andChairmanofitsDepartmentofComputerSciencesince2007.
- 【目录】
-
1NetworkSecurityOverview
1.1MissionandDefinitions
1.2CommonAttacksandDefenseMechanisms
1.2.1Eavesdropping
1.2.2Cryptanalysis
1.2.3PasswordPilfering
1.2.4IdentitySpoofing
1.2.5Buffer-OverflowExploitations
1.2.6Repudiation
1.2.7Intrusion
1.2.8TrafficAnalysis
1.2.9DenialofServiceAttacks
1.2.10MaliciousSoftware
1.3AttackerProfiles
1.3.1Hackers
1.3.2ScriptKiddies
1.3.3CyberSpies
1.3.4ViciousEmployees
1.3.5CyberTerrorists
1.3.6HypotheticalAttackers
1.4BasicSecurityModel
1.5SecurityResources
1.6ClosingRemarks
1.7Exercises
2DataEncryptionAlgorithms
2.1DataEncryptionAlgorithmDesignCriteria
2.1.1ASCIICode
2.1.2XOREncryption
2.1.3CriteriaofDataEncryptions
2.1.4ImplementationCriteria
2.2DataEncryptionStandard
2.2.1FeistelsCipherScheme
2.2.2DESSubkeys
2.2.3DESSubstitutionBoxes
2.2.4DESEncryption
2.2.5DESDecryptionandCorrectnessProof
2.2.6DESSecurityStrength
2.3MultipleDES
2.3.1Triple-DESwithTwoKeys
2.3.22DESand3DES/3
2.3.3Meet-in-the-MiddleAttackson2DES
2.4AdvancedEncryptionStandard
2.4.1AESBasicStructures
2.4.2AESS-Boxes
2.4.3AES-128RoundKeys
2.4.4AddRoundKeys
2.4.5Substitute-Bytes
2.4.6Shift-Rows
2.4.7Mix-Columns
2.4.8AES-128Encryption
2.4.9AES-128DecryptionandCorrectnessProof
2.4.10GaloisFields
2.4.11ConstructionoftheAESS-BoxandItsInverse...
2.4.12AESSecurityStrength
2.5StandardBlock-CipherModesofOperations
2.5.1Electronic-CodebookMode
2.5.2Cipher-Block-ChainingMode
2.5.3Cipher-FeedbackMode
2.5.4Output-FeedbackMode
2.5.5CounterMode
2.6StreamCiphers
2.6.1RC4StreamCipher
2.6.2RC4SecurityWeaknesses
2.7KeyGenerations
2.7.1ANSIX9.17PRNG
2.7.2BBSPseudorandomBitGenerator
2.8ClosingRemarks
2.9Exercises
3Public-KeyCryptographyandKeyManagement
3.1ConceptsofPublic-KeyCryptography
3.2ElementaryConceptsandTheoremsinNumberTheory
3.2.1ModularArithmeticandCongruenceRelations
3.2.2ModularInverse
3.2.3PrimitiveRoots
3.2.4FastModularExponentiation
3.2.5FindingLargePrimeNumbers
3.2.6TheChineseRemainderTheorem
3.2.7FiniteContinuedFractions
3.3Diffie-HellmanKeyExchange
3.3.1KeyExchangeProtocol
3.3.2Man-in-the-MiddleAttacks
3.3.3ElgamaiPKC
3.4RSACryptosystem
3.4.1RSAKeyPairs,Encryptions,andDecryptions
3.4.2RSAParameterAttacks
3.4.3RSAChallengeNumbers
3.5Elliptic-CurveCryptography
3.5.1CommutativeGroupsonEllipticCurves
3.5.2DiscreteEllipticCurves
3.5.3ECCEncodings
3.5.4ECCEncryptionandDecryption
3.5.5ECCKeyExchange
3.5.6ECCStrength
3.6KeyDistributionsandManagement
3.6.1MasterKeysandSessionKeys
3.6.2Public-KeyCertificates
3.6.3CANetworks
3.6.4KeyRings
3.7ClosingRemarks
3.8Exercises
4DataAuthentication
4.1CryptographicHashFunctions
4.1.1DesignCriteriaofCryptographicHashFunctions..
4.1.2QuestforCryptographicHashFunctions
4.1.3BasicStructureofStandardHashFunctions
4.1.4SHA-512
4.1.5WHIRLPOOL
4.2CryptographicChecksums
4.2.1Exclusive-ORCryptographicChecksums
4.2.2DesignCriteriaofMACAlgorithms
4.2.3DataAuthenticationAlgorithm
4.3HMAC
4.3.1DesignCriteriaofHMAC
4.3.2HMACAlgorithm
4.4OffsetCodebookModeofOperations
4.4.1BasicOperations
4.4.2OCBEncryptionandTagGeneration
4.4.3OCBDecryptionandTagVerification
4.5BirthdayAttacks
4.5.1ComplexityUpperBoundofBreakingStrongCollisionResistance
4.5.2SetIntersectionAttack
4.6DigitalSignatureStandard
4.7DualSignaturesandElectronicTransactions
4.7.1DualSignatureApplications
4.7.2DualSignaturesandElectronicTransactions
4.8BlindSignaturesandElectronicCash
4.8.1RSABlindSignatures
4.8.2ElectronicCash
4.9ClosingRemarks
4.10Exercises
5NetworkSecurityProtocolsinPractice
5.1CryptoPlacementsinNetworks
5.1.1CryptoPlacementattheApplicationLayer
5.1.2CryptoPlacementattheTransportLayer
5.1.3CryptoPlacementattheNetworkLayer
5.1.4CryptoPlacementattheData-LinkLayer
5.1.5HardwareversusSoftwareImplementationsofCryptographicAlgorithms
5.2Public-KeyInfrastructure
5.2.1X.509Public-KeyInfrastructure
5.2.2X.509CertificateFormats
5.3IPsec:ASecurityProtocolattheNetworkLayer
5.3.1SecurityAssociation
5.3.2ApplicationModesandSecurityAssociations
5.3.3AHFormat
5.3.4ESPFormat
5.3.5SecretKeyDeterminationandDistribution
5.4SSL/TLS:SecurityProtocolsattheTransportLayer
5.4.1SSLHandshakeProtocol
5.4.2SSLRecordProtocol
5.5PGPandS/MIME:EmailSecurityProtocols
5.5.1BasicEmallSecurityMechanisms
5.5.2PGP
5.5.3S/MIME
5.6Kerberos:AnAuthenticationProtocol
5.6.1BasicIdeas
5.6.2Single-RealmKerberos
5.6.3Multiple-RealmKerberos
5.7SSH:SecurityProtocolsforRemoteLogins
5.8ClosingRemarks
5.9Exercises
6WirelessNetworkSecurity
6.1WirelessCommunicationsand802.11WLANStandards
6.1.1WLANArchitecture
6.1.2802.11Essentials
6.1.3WirelessSecurityVulnerabilities
6.2WEP
6.2.1DeviceAuthenticationandAccessControl
6.2.2DataIntegrityCheck
6.2.3LLCFrameEncryption
6.2.4SecurityFlawsofWEP
6.3WPA
6.3.1DeviceAuthenticationandAccessControls
6.3.2TKIPKeyGenerations
6.3.3TKIPMessageIntegrityCode
6.3.4TKIPKeyMixing
6.3.5WPAEncryptionandDecryption
6.3.6WPASecurityStrengthandWeaknesses
6.4IEEE802.1li/WPA2
6.4.1KeyGenerations
6.4.2CCMPEncryptionsandMIC
6.4.3802.11iSecurityStrengthandWeaknesses
6.5BluetoothSecurity
6.5.1Piconets
6.5.2SecurePairings
6.5.3SAFER+BlockCiphers
6.5.4BluetoothAlgorithmsEl,E21,andE22
6.5.5BluetoothAuthentication
6.5.6APINCrackingAttack
6.5.7BluetoothSecureSimplePairing
6.6WirelessMeshNetworkSecurity
6.7ClosingRemarks
6.8Exercises
7NetworkPerimeterSecurity
7.1GeneralFramework
7.2PacketFilters
7.2.1StatelessFiltering
7.2.2StatefulFiltering
7.3CircuitGateways
7.3.1BasicStructures
7.3.2SOCKS
7.4ApplicationGateways
7.4.1CacheGateways
7.4.2StatefulPacketInspections
7.5TrustedSystemsandBastionHosts
7.5.1TrustedOperatingSystems
7.5.2BastionhostsandGateways
7.6FirewallConfigurations
7.6.1Single-HomedBastionHostSystem
7.6.2Dual-HomedBastionHostSystem
7.6.3ScreenedSubnets
7.6.4DemilitarizedZones
7.6.5NetworkSecurityTopology
7.7NetworkAddressTranslations
7.7.1DynamicNAT
7.7.2VirtualLocal-AreaNetworks
7.7.3SmallOfficeandHomeOfficeFirewalls
7.8SettingUpFirewalls
7.8.1SecurityPolicy
7.8.2BuildingALinuxStatelessPacketFilter
7.9ClosingRemarks
7.10Exercises
8TheArtofAntiMaliciousSoftware
8.1Viruses
8.1.1VirusTypes
8.1.2VirusInfectionSchemes
8.1.3VirusStructures
8.1.4CompressorViruses
8.1.5VirusDisseminations
8.1.6Win32VirusInfectionDissection
8.1.7VirusCreationToolkits
8.2Worms
8.2.1CommonWormTypes
8.2.2TheMorrisWorm
8.2.3TheMelissaWorm
8.2.4EmailAttachments
8.2.5TheCodeRedWorm
8.2.6OtherWormsTargetedatMicrosoftProducts
8.3VirusDefense
8.3.1StandardScanningMethods
8.3.2Anti-VirusSoftwareProducts
8.3.3VirusEmulator
8.4TrojanHorses
8.5Hoaxes
8.6Peer-to-PeerSecurity
8.6.1P2PSecurityVulnerabilities
8.6.2P2PSecurityMeasures
8.6.3InstantMessaging
8.7WebSecurity
8.7.1BasicTypesofWebDocuments
8.7.2SecurityofWebDocuments
8.7.3ActiveX
8.7.4Cookies
8.7.5Spyware
8.7.6AJAXSecurity
8.7.7SafeWebSurfing
8.8DistributedDenialofServiceAttacks
8.8.1Master-SlaveDDoSAttacks
8.8.2Master-Slave-ReflectorDDoSAttacks
8.8.3DDoSAttacksCountermeasures
8.9ClosingRemarks
8.10Exercises
9TheArtofIntrusionDetection
9.1BasicIdeasofIntrusionDetection
9.1.1BasicMethodology
9.1.2Auditing
9.1.3IDSComponents
9.1.4IDSArchitecture
9.1.5IntrusionDetectionPolicies
9.1.6UnacceptableBehaviors
9.2Network-BasedDetectionsandHost-BasedDetections
9.2.1Network-BasedDetections
9.2.2Host-BasedDetections
9.3SignatureDetections
9.3.1NetworkSignatures
9.3.2Host-BasedSignatures
9.3.3OutsiderBehaviorsandInsiderMisuses
9.3.4SignatureDetectionSystems
9.4StatisticalAnalysis
9.4.1EventCounter
9.4.2EventGauge
9.4.3EventTimer
9.4.4ResourceUtilization
9.4.5StatisticalTechniques
9.5BehavioralDataForensics
9.5.1DataMiningTechniques
9.5.2ABehavioralDataForensicExample
9.6Honeypots
9.6.1TypesofHoneypots
9.6.2Honeyd
9.6.3MWCollectProjects
9.6.4HoneynetProjects
9.7ClosingRemarks
9.8Exercises
A7-bitASCIIcode
BSHA-512Constants(inhexadecimal)..
CDataCompressionusingZIP
DBase64Encoding
ECrackingWEPKeysusingWEPCrack
E.1SystemSetup
E.2ExperimentDetails
E.3SampleCode
FAcronyms
References
Index
点击展开
点击收起
— 没有更多了 —
以下为对购买帮助不大的评价