• 网络安全基础应用与标准第4版美斯托林斯著清华大学出版社9787302229728
21年品牌 40万+商家 超1.5亿件商品

网络安全基础应用与标准第4版美斯托林斯著清华大学出版社9787302229728

二手书,此书是一本无赠品和附件,套装不全,购买套装请联系客服

5 1.1折 46 八五品

库存5件

山东济南
认证卖家担保交易快速发货售后保障

作者[美]斯托林斯 著

出版社清华大学出版社

出版时间2010-07

版次1

装帧平装

货号9787302229728

上书时间2024-12-22

古籍旧书院

五年老店
已实名 已认证 进店 收藏店铺

   商品详情   

品相描述:八五品
商品描述
书名:网络安全基础 应用与标准 第4版
图书标准信息
  • 作者 [美]斯托林斯 著
  • 出版社 清华大学出版社
  • 出版时间 2010-07
  • 版次 1
  • ISBN 9787302229728
  • 定价 46.00元
  • 装帧 平装
  • 开本 16开
  • 纸张 胶版纸
  • 页数 417页
  • 正文语种 英语
【内容简介】
《网络安全基础:应用与标准(第4版)(影印版)》由著名作者WilliamStallillgs编写,以当今网络安全的实际解决方案为基础,既简明扼要,又全面系统地介绍了网络安全的主要内容,包括基本原理、重要技术、主要方法和重要的工业标准等。全书共包含11章。除第1章引言外,其余各章分为三大部分叙述:第一部分是密码学,重点介绍分组密码、流密码、消息认证码、安全杂凑函数、公钥密码和数字签名等的基本原理、主要方法和重要应用场景等,并简要介绍了几种常用的典型算法,包括DES算法、AES算法、RC4算法和RSA算法等;第二部分是网络安全应用,简要介绍了传输层安全中的SSL/TLS协议、无线局域网安全及WAP协议、电子邮件安全与PGP与S/MIME协议;IP层安全与IPsec协议等。第三部分是系统安全,简要介绍了入侵检测与口令管理、恶意软件与防火墙等。
《网络安全基础:应用与标准(第4版)(影印版)》以最新和实用的网络安全知识为主题,采用深入浅出的叙述手法,每章末尾还给出一定的推荐读物和思考练习题。因此,《网络安全基础:应用与标准(第4版)(影印版)》既是高等学校网络安全基础课程的好教材,也是工程技术人员和网络爱好者了解网络安全基本概貌的好读物。
【目录】
Prefaceix
AbouttheAuthorxiv
Chapter1Introduction1
1.1ComputerSecurityConcepts3
1.2TheOSISecurityArchitecture8
1.3SecurityAttacks9
1.4SecurityServices13
1.5SecurityMechanisms16
1.6AModelforNetworkSecurity19
1.7Standards21
1.8OutlineofThisBook21
1.9RecommendedReading22
1.10InternetandWebResources23
1.11KeyTerms,ReviewQuestions,andProblems25

PARTONECRYPTOGRAPHY27
Chapter2SymmetricEncryptionandMessageConfidentiality27
2.1SymmetricEncryptionPrinciples28
2.2SymmetricBlockEncryptionAlgorithms34
2.3RandomandPseudorandomNumbers42
2.4StreamCiphersandRC445
2.5CipherBlockModesofOperation50
2.6RecommendedReadingandWebSites55
2.7KeyTerms,ReviewQuestions,andProblems56

Chapter3Public-KeyCryptographyandMessageAuthentication61
3.1ApproachestoMessageAuthentication62
3.2SecureHashFunctions67
3.3MessageAuthenticationCodes73
3.4Public-KeyCryptographyPrinciples79
3.5Public-KeyCryptographyAlgorithms83
3.6DigitalSignatures90
3.7RecommendedReadingandWebSites90
3.8KeyTerms,ReviewQuestions,andProblems91

PARTTWONETWORKSECURITYAPPLICATIONS97
Chapter4KeyDistributionandUserAuthentication97
4.1SymmetricKeyDistributionUsingSymmetricEncryption98
4.2Kerberos99
4.3KeyDistributionUsingAsymmetricEncryption114
4.4X.509Certificates116
4.5Public-KeyInfrastructure124
4.6FederatedIdentityManagement126
4.7RecommendedReadingandWebSites132
4.8KeyTerms,ReviewQuestions,andProblems133

Chapter5Transport-LevelSecurity139
5.1WebSecurityConsiderations140
5.2SecureSocketLayerandTransportLayerSecurity143
5.3TransportLayerSecurity156
5.4HTTPS160
5.5SecureShell(SSH)162
5.6RecommendedReadingandWebSites173
5.7KeyTerms,ReviewQuestions,andProblems173

Chapter6WirelessNetworkSecurity175
6.1IEEE802.11WirelessLANOverview177
6.2IEEE802.11iWirelessLANSecurity183
6.3WirelessApplicationProtocolOverview197
6.4WirelessTransportLayerSecurity204
6.5WAPEnd-to-EndSecurity214
6.6RecommendedReadingandWebSites217
6.7KeyTerms,ReviewQuestions,andProblems218

Chapter7ElectronicMailSecurity221
7.1PrettyGoodPrivacy222
7.2S/MIME241
7.3DomainKeysIdentifiedMail257
7.4RecommendedReadingandWebSites264
7.5KeyTerms,ReviewQuestions,andProblems265
Appendix7ARadix-64Conversion266

Chapter8IPSecurity269
8.1IPSecurityOverview270
8.2IPSecurityPolicy276
8.3EncapsulatingSecurityPayload281
8.4CombiningSecurityAssociations288
8.5InternetKeyExchange292
8.6CryptographicSuites301
8.7RecommendedReadingandWebSites302
8.8KeyTerms,ReviewQuestions,andProblems303

PARTTHREESYSTEMSECURITY305
Chapter9Intruders305
9.1Intruders307
9.2IntrusionDetection312
9.3PasswordManagement323
9.4RecommendedReadingandWebSites333
9.5KeyTerms,ReviewQuestions,andProblems334
Appendix9ATheBase-RateFallacy337

Chapter10MaliciousSoftware340
10.1TypesofMaliciousSoftware341
10.2Viruses346
10.3VirusCountermeasures351
10.4Worms356
10.5DistributedDenialofServiceAttacks365
10.6RecommendedReadingandWebSites370
10.7KeyTerms,ReviewQuestions,andProblems371

Chapter11Firewalls374
11.1TheNeedforFirewalls375
11.2FirewallCharacteristics376
11.3TypesofFirewalls378
11.4FirewallBasing385
11.5FirewaULocationandConfigurations388
11.6RecommendedReadingandWebSite393
11.7KeyTerms,ReviewQuestions,andProblems394

APPENDICES398
AppendixASomeAspectsofNumberTheory398
A.1PrimeandRelativelyPrimeNumbers399
A.2ModularArithmetic401
AppendixBProjectsforTeachingNetworkSecurity403
B.1ResearchProjects404
B.2HackingProject405
B.3ProgrammingProjects405
B.4LaboratoryExercises406
B.5PracticalSecurityAssessments406
B.6WritingAssignments406
B.7Reading/ReportAssignments407
Index408
ONLINECHAPTERS

Chapter12NetworkManagementSecurity
12.1BasicConceptsofSNMP
12.2SNMPvlCommunityFacility
12.3SNMPv3
12.4RecommendedReadingandWebSites
12.5KeyTerms,ReviewQuestions,andProblems

Chapter13LegalandEthicalAspects
13.1CybercrimeandComputerCrime
13.2IntellectualProperty
13.3Privacy
13.4EthicalIssues
13.5RecommendedReadingandWebSites
13.6KeyTerms,ReviewQuestions,andProblems
ONLINEAPPENDICES
AppendixCStandardsandStandards-SettingOrganizations
C.1TheImportanceofStandards
C.2InternetStandardsandtheInternetSociety
C.3NationalInstituteofStandardsandTechnology
AppendixDTCP/IPandOSI
D.1ProtocolsandProtocolArchitectures
D.2TheTCP/IPProtocolArchitecture
D.3TheRoleofanInternetProtocol
D.4IPv4
D.5IPv6
D.6TheOSIProtocolArchitecture
AppendixEPseudorandomNumberGeneration
E.1PRNGRequirements
E.2PRNGUsingaBlockCipher
E.3PRNGUsingaHashFunctionorMessageAuthenticationCode
AppendixFKerberosEncryptionTechniques
E1Password-to-KeyTransformation
E2PropagatingCipherBlockChainingMode
AppendixGDataCompressionUsingZIP
G.1CompressionAlgorithm
G.2DecompressionAlgorithm
AppendixHPGPRandomNumberGeneration
H.1TrueRandomNumbers
H.2PseudorandomNumbers
AppendixITheInternationalReferenceAlphabet
Glossary
References
点击展开 点击收起

—  没有更多了  —

以下为对购买帮助不大的评价

此功能需要访问孔网APP才能使用
暂时不用
打开孔网APP