• Computer Network Security:Theory And Practice(英文版)
图书条目标准图
21年品牌 40万+商家 超1.5亿件商品

Computer Network Security:Theory And Practice(英文版)

17.38 3.6折 48 九品

仅1件

北京昌平
认证卖家担保交易快速发货售后保障

作者[美]王杰 著

出版社高等教育出版社

出版时间2008-09

版次1

装帧平装

货号A10

上书时间2024-12-09

旧书香书城

十年老店
已实名 已认证 进店 收藏店铺

   商品详情   

品相描述:九品
图书标准信息
  • 作者 [美]王杰 著
  • 出版社 高等教育出版社
  • 出版时间 2008-09
  • 版次 1
  • ISBN 9787040241624
  • 定价 48.00元
  • 装帧 平装
  • 开本 16开
  • 纸张 胶版纸
  • 页数 384页
  • 字数 430千字
  • 正文语种 英语
【内容简介】
  《ComputerNetworkSecurity:TheoryAndPractice》introducestothereaderacompleteandconciseviewofnetworksecurity.Itprovidesin-depththeoreticalcoverageofrecentadvancementsandpracticalsolutionstonetworksecuritythreats.Thisbookcanbeusedforaone-semesternetworksecuritycourseforgraduateandupper-levelundergraduatestudents,aswellasareferenceforITprofessionals.
  Dr.WanghasbeenProfessorofComputerScienceattheUniversityofMassachusettsLowellsince2001,DirectorofitsCenterforNetworkandInformationSecuritysince2004,andChairmanofitsDepartmentofComputerSciencesince2007.
【目录】
1NetworkSecurityOverview
1.1MissionandDefinitions
1.2CommonAttacksandDefenseMechanisms
1.2.1Eavesdropping
1.2.2Cryptanalysis
1.2.3PasswordPilfering
1.2.4IdentitySpoofing
1.2.5Buffer-OverflowExploitations
1.2.6Repudiation
1.2.7Intrusion
1.2.8TrafficAnalysis
1.2.9DenialofServiceAttacks
1.2.10MaliciousSoftware
1.3AttackerProfiles
1.3.1Hackers
1.3.2ScriptKiddies
1.3.3CyberSpies
1.3.4ViciousEmployees
1.3.5CyberTerrorists
1.3.6HypotheticalAttackers
1.4BasicSecurityModel
1.5SecurityResources
1.6ClosingRemarks
1.7Exercises

2DataEncryptionAlgorithms
2.1DataEncryptionAlgorithmDesignCriteria
2.1.1ASCIICode
2.1.2XOREncryption
2.1.3CriteriaofDataEncryptions
2.1.4ImplementationCriteria
2.2DataEncryptionStandard
2.2.1FeistelsCipherScheme
2.2.2DESSubkeys
2.2.3DESSubstitutionBoxes
2.2.4DESEncryption
2.2.5DESDecryptionandCorrectnessProof
2.2.6DESSecurityStrength
2.3MultipleDES
2.3.1Triple-DESwithTwoKeys
2.3.22DESand3DES/3
2.3.3Meet-in-the-MiddleAttackson2DES
2.4AdvancedEncryptionStandard
2.4.1AESBasicStructures
2.4.2AESS-Boxes
2.4.3AES-128RoundKeys
2.4.4AddRoundKeys
2.4.5Substitute-Bytes
2.4.6Shift-Rows
2.4.7Mix-Columns
2.4.8AES-128Encryption
2.4.9AES-128DecryptionandCorrectnessProof
2.4.10GaloisFields
2.4.11ConstructionoftheAESS-BoxandItsInverse...
2.4.12AESSecurityStrength
2.5StandardBlock-CipherModesofOperations
2.5.1Electronic-CodebookMode
2.5.2Cipher-Block-ChainingMode
2.5.3Cipher-FeedbackMode
2.5.4Output-FeedbackMode
2.5.5CounterMode
2.6StreamCiphers
2.6.1RC4StreamCipher
2.6.2RC4SecurityWeaknesses
2.7KeyGenerations
2.7.1ANSIX9.17PRNG
2.7.2BBSPseudorandomBitGenerator
2.8ClosingRemarks
2.9Exercises

3Public-KeyCryptographyandKeyManagement
3.1ConceptsofPublic-KeyCryptography
3.2ElementaryConceptsandTheoremsinNumberTheory
3.2.1ModularArithmeticandCongruenceRelations
3.2.2ModularInverse
3.2.3PrimitiveRoots
3.2.4FastModularExponentiation
3.2.5FindingLargePrimeNumbers
3.2.6TheChineseRemainderTheorem
3.2.7FiniteContinuedFractions
3.3Diffie-HellmanKeyExchange
3.3.1KeyExchangeProtocol
3.3.2Man-in-the-MiddleAttacks
3.3.3ElgamaiPKC
3.4RSACryptosystem
3.4.1RSAKeyPairs,Encryptions,andDecryptions
3.4.2RSAParameterAttacks
3.4.3RSAChallengeNumbers
3.5Elliptic-CurveCryptography
3.5.1CommutativeGroupsonEllipticCurves
3.5.2DiscreteEllipticCurves
3.5.3ECCEncodings
3.5.4ECCEncryptionandDecryption
3.5.5ECCKeyExchange
3.5.6ECCStrength
3.6KeyDistributionsandManagement
3.6.1MasterKeysandSessionKeys
3.6.2Public-KeyCertificates
3.6.3CANetworks
3.6.4KeyRings
3.7ClosingRemarks
3.8Exercises

4DataAuthentication
4.1CryptographicHashFunctions
4.1.1DesignCriteriaofCryptographicHashFunctions..
4.1.2QuestforCryptographicHashFunctions
4.1.3BasicStructureofStandardHashFunctions
4.1.4SHA-512
4.1.5WHIRLPOOL
4.2CryptographicChecksums
4.2.1Exclusive-ORCryptographicChecksums
4.2.2DesignCriteriaofMACAlgorithms
4.2.3DataAuthenticationAlgorithm
4.3HMAC
4.3.1DesignCriteriaofHMAC
4.3.2HMACAlgorithm
4.4OffsetCodebookModeofOperations
4.4.1BasicOperations
4.4.2OCBEncryptionandTagGeneration
4.4.3OCBDecryptionandTagVerification
4.5BirthdayAttacks
4.5.1ComplexityUpperBoundofBreakingStrongCollisionResistance
4.5.2SetIntersectionAttack
4.6DigitalSignatureStandard
4.7DualSignaturesandElectronicTransactions
4.7.1DualSignatureApplications
4.7.2DualSignaturesandElectronicTransactions
4.8BlindSignaturesandElectronicCash
4.8.1RSABlindSignatures
4.8.2ElectronicCash
4.9ClosingRemarks
4.10Exercises

5NetworkSecurityProtocolsinPractice
5.1CryptoPlacementsinNetworks
5.1.1CryptoPlacementattheApplicationLayer
5.1.2CryptoPlacementattheTransportLayer
5.1.3CryptoPlacementattheNetworkLayer
5.1.4CryptoPlacementattheData-LinkLayer
5.1.5HardwareversusSoftwareImplementationsofCryptographicAlgorithms
5.2Public-KeyInfrastructure
5.2.1X.509Public-KeyInfrastructure
5.2.2X.509CertificateFormats
5.3IPsec:ASecurityProtocolattheNetworkLayer
5.3.1SecurityAssociation
5.3.2ApplicationModesandSecurityAssociations
5.3.3AHFormat
5.3.4ESPFormat
5.3.5SecretKeyDeterminationandDistribution
5.4SSL/TLS:SecurityProtocolsattheTransportLayer
5.4.1SSLHandshakeProtocol
5.4.2SSLRecordProtocol
5.5PGPandS/MIME:EmailSecurityProtocols
5.5.1BasicEmallSecurityMechanisms
5.5.2PGP
5.5.3S/MIME
5.6Kerberos:AnAuthenticationProtocol
5.6.1BasicIdeas
5.6.2Single-RealmKerberos
5.6.3Multiple-RealmKerberos
5.7SSH:SecurityProtocolsforRemoteLogins
5.8ClosingRemarks
5.9Exercises

6WirelessNetworkSecurity
6.1WirelessCommunicationsand802.11WLANStandards
6.1.1WLANArchitecture
6.1.2802.11Essentials
6.1.3WirelessSecurityVulnerabilities
6.2WEP
6.2.1DeviceAuthenticationandAccessControl
6.2.2DataIntegrityCheck
6.2.3LLCFrameEncryption
6.2.4SecurityFlawsofWEP
6.3WPA
6.3.1DeviceAuthenticationandAccessControls
6.3.2TKIPKeyGenerations
6.3.3TKIPMessageIntegrityCode
6.3.4TKIPKeyMixing
6.3.5WPAEncryptionandDecryption
6.3.6WPASecurityStrengthandWeaknesses
6.4IEEE802.1li/WPA2
6.4.1KeyGenerations
6.4.2CCMPEncryptionsandMIC
6.4.3802.11iSecurityStrengthandWeaknesses
6.5BluetoothSecurity
6.5.1Piconets
6.5.2SecurePairings
6.5.3SAFER+BlockCiphers
6.5.4BluetoothAlgorithmsEl,E21,andE22
6.5.5BluetoothAuthentication
6.5.6APINCrackingAttack
6.5.7BluetoothSecureSimplePairing
6.6WirelessMeshNetworkSecurity
6.7ClosingRemarks
6.8Exercises

7NetworkPerimeterSecurity
7.1GeneralFramework
7.2PacketFilters
7.2.1StatelessFiltering
7.2.2StatefulFiltering
7.3CircuitGateways
7.3.1BasicStructures
7.3.2SOCKS
7.4ApplicationGateways
7.4.1CacheGateways
7.4.2StatefulPacketInspections
7.5TrustedSystemsandBastionHosts
7.5.1TrustedOperatingSystems
7.5.2BastionhostsandGateways
7.6FirewallConfigurations
7.6.1Single-HomedBastionHostSystem
7.6.2Dual-HomedBastionHostSystem
7.6.3ScreenedSubnets
7.6.4DemilitarizedZones
7.6.5NetworkSecurityTopology
7.7NetworkAddressTranslations
7.7.1DynamicNAT
7.7.2VirtualLocal-AreaNetworks
7.7.3SmallOfficeandHomeOfficeFirewalls
7.8SettingUpFirewalls
7.8.1SecurityPolicy
7.8.2BuildingALinuxStatelessPacketFilter
7.9ClosingRemarks
7.10Exercises

8TheArtofAntiMaliciousSoftware
8.1Viruses
8.1.1VirusTypes
8.1.2VirusInfectionSchemes
8.1.3VirusStructures
8.1.4CompressorViruses
8.1.5VirusDisseminations
8.1.6Win32VirusInfectionDissection
8.1.7VirusCreationToolkits
8.2Worms
8.2.1CommonWormTypes
8.2.2TheMorrisWorm
8.2.3TheMelissaWorm
8.2.4EmailAttachments
8.2.5TheCodeRedWorm
8.2.6OtherWormsTargetedatMicrosoftProducts
8.3VirusDefense
8.3.1StandardScanningMethods
8.3.2Anti-VirusSoftwareProducts
8.3.3VirusEmulator
8.4TrojanHorses
8.5Hoaxes
8.6Peer-to-PeerSecurity
8.6.1P2PSecurityVulnerabilities
8.6.2P2PSecurityMeasures
8.6.3InstantMessaging
8.7WebSecurity
8.7.1BasicTypesofWebDocuments
8.7.2SecurityofWebDocuments
8.7.3ActiveX
8.7.4Cookies
8.7.5Spyware
8.7.6AJAXSecurity
8.7.7SafeWebSurfing
8.8DistributedDenialofServiceAttacks
8.8.1Master-SlaveDDoSAttacks
8.8.2Master-Slave-ReflectorDDoSAttacks
8.8.3DDoSAttacksCountermeasures
8.9ClosingRemarks
8.10Exercises

9TheArtofIntrusionDetection
9.1BasicIdeasofIntrusionDetection
9.1.1BasicMethodology
9.1.2Auditing
9.1.3IDSComponents
9.1.4IDSArchitecture
9.1.5IntrusionDetectionPolicies
9.1.6UnacceptableBehaviors
9.2Network-BasedDetectionsandHost-BasedDetections
9.2.1Network-BasedDetections
9.2.2Host-BasedDetections
9.3SignatureDetections
9.3.1NetworkSignatures
9.3.2Host-BasedSignatures
9.3.3OutsiderBehaviorsandInsiderMisuses
9.3.4SignatureDetectionSystems
9.4StatisticalAnalysis
9.4.1EventCounter
9.4.2EventGauge
9.4.3EventTimer
9.4.4ResourceUtilization
9.4.5StatisticalTechniques
9.5BehavioralDataForensics
9.5.1DataMiningTechniques
9.5.2ABehavioralDataForensicExample
9.6Honeypots
9.6.1TypesofHoneypots
9.6.2Honeyd
9.6.3MWCollectProjects
9.6.4HoneynetProjects
9.7ClosingRemarks
9.8Exercises

A7-bitASCIIcode
BSHA-512Constants(inhexadecimal)..
CDataCompressionusingZIP
DBase64Encoding
ECrackingWEPKeysusingWEPCrack
E.1SystemSetup
E.2ExperimentDetails
E.3SampleCode
FAcronyms
References
Index
点击展开 点击收起

—  没有更多了  —

以下为对购买帮助不大的评价

此功能需要访问孔网APP才能使用
暂时不用
打开孔网APP