网络安全基础应用与标准第4版美斯托林斯著清华大学出版社9787302229728
二手书,此书是一本无赠品和附件,套装不全,购买套装请联系客服
¥
5
1.1折
¥
46
八五品
库存5件
作者[美]斯托林斯 著
出版社清华大学出版社
出版时间2010-07
版次1
装帧平装
货号9787302229728
上书时间2024-12-22
商品详情
- 品相描述:八五品
- 商品描述
-
书名:网络安全基础 应用与标准 第4版
图书标准信息
-
作者
[美]斯托林斯 著
-
出版社
清华大学出版社
-
出版时间
2010-07
-
版次
1
-
ISBN
9787302229728
-
定价
46.00元
-
装帧
平装
-
开本
16开
-
纸张
胶版纸
-
页数
417页
-
正文语种
英语
- 【内容简介】
-
《网络安全基础:应用与标准(第4版)(影印版)》由著名作者WilliamStallillgs编写,以当今网络安全的实际解决方案为基础,既简明扼要,又全面系统地介绍了网络安全的主要内容,包括基本原理、重要技术、主要方法和重要的工业标准等。全书共包含11章。除第1章引言外,其余各章分为三大部分叙述:第一部分是密码学,重点介绍分组密码、流密码、消息认证码、安全杂凑函数、公钥密码和数字签名等的基本原理、主要方法和重要应用场景等,并简要介绍了几种常用的典型算法,包括DES算法、AES算法、RC4算法和RSA算法等;第二部分是网络安全应用,简要介绍了传输层安全中的SSL/TLS协议、无线局域网安全及WAP协议、电子邮件安全与PGP与S/MIME协议;IP层安全与IPsec协议等。第三部分是系统安全,简要介绍了入侵检测与口令管理、恶意软件与防火墙等。
《网络安全基础:应用与标准(第4版)(影印版)》以最新和实用的网络安全知识为主题,采用深入浅出的叙述手法,每章末尾还给出一定的推荐读物和思考练习题。因此,《网络安全基础:应用与标准(第4版)(影印版)》既是高等学校网络安全基础课程的好教材,也是工程技术人员和网络爱好者了解网络安全基本概貌的好读物。
- 【目录】
-
Prefaceix
AbouttheAuthorxiv
Chapter1Introduction1
1.1ComputerSecurityConcepts3
1.2TheOSISecurityArchitecture8
1.3SecurityAttacks9
1.4SecurityServices13
1.5SecurityMechanisms16
1.6AModelforNetworkSecurity19
1.7Standards21
1.8OutlineofThisBook21
1.9RecommendedReading22
1.10InternetandWebResources23
1.11KeyTerms,ReviewQuestions,andProblems25
PARTONECRYPTOGRAPHY27
Chapter2SymmetricEncryptionandMessageConfidentiality27
2.1SymmetricEncryptionPrinciples28
2.2SymmetricBlockEncryptionAlgorithms34
2.3RandomandPseudorandomNumbers42
2.4StreamCiphersandRC445
2.5CipherBlockModesofOperation50
2.6RecommendedReadingandWebSites55
2.7KeyTerms,ReviewQuestions,andProblems56
Chapter3Public-KeyCryptographyandMessageAuthentication61
3.1ApproachestoMessageAuthentication62
3.2SecureHashFunctions67
3.3MessageAuthenticationCodes73
3.4Public-KeyCryptographyPrinciples79
3.5Public-KeyCryptographyAlgorithms83
3.6DigitalSignatures90
3.7RecommendedReadingandWebSites90
3.8KeyTerms,ReviewQuestions,andProblems91
PARTTWONETWORKSECURITYAPPLICATIONS97
Chapter4KeyDistributionandUserAuthentication97
4.1SymmetricKeyDistributionUsingSymmetricEncryption98
4.2Kerberos99
4.3KeyDistributionUsingAsymmetricEncryption114
4.4X.509Certificates116
4.5Public-KeyInfrastructure124
4.6FederatedIdentityManagement126
4.7RecommendedReadingandWebSites132
4.8KeyTerms,ReviewQuestions,andProblems133
Chapter5Transport-LevelSecurity139
5.1WebSecurityConsiderations140
5.2SecureSocketLayerandTransportLayerSecurity143
5.3TransportLayerSecurity156
5.4HTTPS160
5.5SecureShell(SSH)162
5.6RecommendedReadingandWebSites173
5.7KeyTerms,ReviewQuestions,andProblems173
Chapter6WirelessNetworkSecurity175
6.1IEEE802.11WirelessLANOverview177
6.2IEEE802.11iWirelessLANSecurity183
6.3WirelessApplicationProtocolOverview197
6.4WirelessTransportLayerSecurity204
6.5WAPEnd-to-EndSecurity214
6.6RecommendedReadingandWebSites217
6.7KeyTerms,ReviewQuestions,andProblems218
Chapter7ElectronicMailSecurity221
7.1PrettyGoodPrivacy222
7.2S/MIME241
7.3DomainKeysIdentifiedMail257
7.4RecommendedReadingandWebSites264
7.5KeyTerms,ReviewQuestions,andProblems265
Appendix7ARadix-64Conversion266
Chapter8IPSecurity269
8.1IPSecurityOverview270
8.2IPSecurityPolicy276
8.3EncapsulatingSecurityPayload281
8.4CombiningSecurityAssociations288
8.5InternetKeyExchange292
8.6CryptographicSuites301
8.7RecommendedReadingandWebSites302
8.8KeyTerms,ReviewQuestions,andProblems303
PARTTHREESYSTEMSECURITY305
Chapter9Intruders305
9.1Intruders307
9.2IntrusionDetection312
9.3PasswordManagement323
9.4RecommendedReadingandWebSites333
9.5KeyTerms,ReviewQuestions,andProblems334
Appendix9ATheBase-RateFallacy337
Chapter10MaliciousSoftware340
10.1TypesofMaliciousSoftware341
10.2Viruses346
10.3VirusCountermeasures351
10.4Worms356
10.5DistributedDenialofServiceAttacks365
10.6RecommendedReadingandWebSites370
10.7KeyTerms,ReviewQuestions,andProblems371
Chapter11Firewalls374
11.1TheNeedforFirewalls375
11.2FirewallCharacteristics376
11.3TypesofFirewalls378
11.4FirewallBasing385
11.5FirewaULocationandConfigurations388
11.6RecommendedReadingandWebSite393
11.7KeyTerms,ReviewQuestions,andProblems394
APPENDICES398
AppendixASomeAspectsofNumberTheory398
A.1PrimeandRelativelyPrimeNumbers399
A.2ModularArithmetic401
AppendixBProjectsforTeachingNetworkSecurity403
B.1ResearchProjects404
B.2HackingProject405
B.3ProgrammingProjects405
B.4LaboratoryExercises406
B.5PracticalSecurityAssessments406
B.6WritingAssignments406
B.7Reading/ReportAssignments407
Index408
ONLINECHAPTERS
Chapter12NetworkManagementSecurity
12.1BasicConceptsofSNMP
12.2SNMPvlCommunityFacility
12.3SNMPv3
12.4RecommendedReadingandWebSites
12.5KeyTerms,ReviewQuestions,andProblems
Chapter13LegalandEthicalAspects
13.1CybercrimeandComputerCrime
13.2IntellectualProperty
13.3Privacy
13.4EthicalIssues
13.5RecommendedReadingandWebSites
13.6KeyTerms,ReviewQuestions,andProblems
ONLINEAPPENDICES
AppendixCStandardsandStandards-SettingOrganizations
C.1TheImportanceofStandards
C.2InternetStandardsandtheInternetSociety
C.3NationalInstituteofStandardsandTechnology
AppendixDTCP/IPandOSI
D.1ProtocolsandProtocolArchitectures
D.2TheTCP/IPProtocolArchitecture
D.3TheRoleofanInternetProtocol
D.4IPv4
D.5IPv6
D.6TheOSIProtocolArchitecture
AppendixEPseudorandomNumberGeneration
E.1PRNGRequirements
E.2PRNGUsingaBlockCipher
E.3PRNGUsingaHashFunctionorMessageAuthenticationCode
AppendixFKerberosEncryptionTechniques
E1Password-to-KeyTransformation
E2PropagatingCipherBlockChainingMode
AppendixGDataCompressionUsingZIP
G.1CompressionAlgorithm
G.2DecompressionAlgorithm
AppendixHPGPRandomNumberGeneration
H.1TrueRandomNumbers
H.2PseudorandomNumbers
AppendixITheInternationalReferenceAlphabet
Glossary
References
点击展开
点击收起
— 没有更多了 —
以下为对购买帮助不大的评价