注冊 | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當前位置: 首頁出版圖書科學技術計算機/網(wǎng)絡信息安全計算機安全原理(影印版 教育部推薦引進版教材)

計算機安全原理(影印版 教育部推薦引進版教材)

計算機安全原理(影印版 教育部推薦引進版教材)

定 價:¥49.50

作 者: (美)Wm.Arthur Conklin等著
出版社: 高等教育出版社
叢編項:
標 簽: 暫缺

ISBN: 9787040167757 出版時間: 2005-06-01 包裝: 簡裝本
開本: 23cm 頁數(shù): 681 字數(shù):  

內(nèi)容簡介

  通過本書,既可以學習到計算機和網(wǎng)絡安全的基礎知識,又可以為參加 CompTIA的Security+認證考試做好準備;本書也涵蓋了(ISC)2 SSCP認證考試的內(nèi)容——該認證考試側重于最佳實踐、安全專家的角色以及責任。本書由IT安全領域的專家編寫,從信息安全的三個層面——技術、實踐和意識— —較為全面地闡述了通信、基礎設施和操作安全的基本原理;還詳細介紹了計算機系統(tǒng)和網(wǎng)絡如何防御各種攻擊。本書共包含24章,分別講述了以下主題:計算機安全概論與趨勢,一般的安全概念,運營/組織安全,人員在安全中的作用,加密,公鑰基礎結構,標準和協(xié)議,物理安全對網(wǎng)絡安全的影響,網(wǎng)絡基礎,基礎結構安全,遠程訪問,無線通信與及時消息,安全基線,攻擊和惡意代碼,Email,Web組件,軟件開發(fā),災難恢復、業(yè)務連續(xù)性與組織策略,風險管理,變更管理,有關計算機的爭論,安全與法律。本書適合作為計算機專業(yè)、信息系統(tǒng)與管理專業(yè)、電子信息科學專業(yè)的本科生教材。

作者簡介

暫缺《計算機安全原理(影印版 教育部推薦引進版教材)》作者簡介

圖書目錄

Acknowledgments
 Foreword
 Preface
 Introduction
Chapter 1 Introduction and Security Trends
 The Security Problem
 Security Incidents
 Threats to Security
 Security Trends
 Avenues of Attack
 The Steps in an Attack
 Minimizing Possible Avenues of Attack
 Types of Attacks
 Ghapter Review
Chapter 2 General Security Concepts
 Basic Security Terminology
 Security Basics
 Access Control
 Authentication
 Security Models
 Confidentiality Models
 Integrity Models
 Chapter Review
Chapter 3 Operational/Organizational Security
 Security Operations in Your Organization
 Policies, Procedures, Standards, and Guidelines
 The Security Perimeter
 Physical Security
 Access Controls
 Physical Barriers
 Social Engineering
 Environment
 Fire Suppression
 Wireless
 Electromagnetic Eavesdropping
 Shielding
 Location
 Chapter
Chapter 4 The Role of People in Security
 People--A Security Problem
 Poor Security Practices
 Social Engineering
 People as a Security Tool
 Security Awareness
 Chapter Review
Chapter 5 Cryptography
 Algorithms
 Hashing
 SHA
 Message Digest (MD)
 Hashing Summary
 Symmetric Encryption
 DES
 3DES
 AES
 CAST
 RC
 Blowfish
 IDEA
 Symmetric Encryption Summary
 Asymmetric Encryption
 RSA
 Diffie-Hellman
 EIGamal
 ECC
 Asymmetric Encryption Summary
 Usage
 Confidentiality
 Integrity
 Nonrepudiation
 Authentication
 Digital Signatures
 Key Escrow
 Chapter Review
Chapter 6 Public Key Infrastructure
 The Basics of Public Key Infrastructures
 Certificate Authorities
 Registration Authorities
 Local Registration Authorities
 Certificate Repositories
 Trust and Certificate Verification
 Digital Certificates
 Certificate Attributes
 Certificate Extensions
 Certificate Lifecycles
 Centralized or Decentralized Infrastructures
 Hardware Storage Devices
 Private Key Protection
 Key Recovery
 Key Escrow
 Public Certificate Authorities
 In-House Certificate Authorities
 Outsourced Certificate Authorities
 Tying Different PI(Is Together
 Trust Models
 Certificate Usage
 Chapter Review
Chapter 7 Standards and Protocols
 PKIX/PKCS
 PKIX Standards
 PKCS
 Why You Need to Know
 X.509
 SSL/TLS
 ISAKMP
 CMP
 XKMS
 S/MIME
 IETFS/MIME v3 Specifications
 PGP
 How It Works
 Where Can You Use PCP?
 HTFPS
 IPSec
 CEP
 FIPS
 Common Criteria (CC)
 WTLS
 WEP
 WEP Security Issues
 ISO 17799
 Chapter Review
Chapter 8 The Impact of Physical Security on Network Security
 The Problem
 Physical Security Safeguards
 Policies and Procedures
 Access Controls
 Authentication
 Chapter Review
Chapter 9 Network Fundamentals
 Network Architectures
 Network Topology
 Network Protocols
 Packets
 TCP vs. UDP
 ICMP
 Packet Delivery
 Local Packet Delivery
 Remote Packet Delivery
 Subnetting
 Network Address Translation
 Chapter Review
Chapter 10 Infrastructure Security
 Devices
 Workstations
 Savers
 Network Interface Cards (NICs)
 Hubs
 Bridges
 Switches
 Routers
 Firewalls
 Wireless
 Modems
 RAS
 Telecom/PBX
 VPN
 IDS
 Network Monitoring/Diagnostic
 Mobile Devices
 Media
 Coax
 UTP/STP
 Fiber
 Unguided Media
 Security Concerns for Transmission Media
 Physical Security
 Removable Media
 Magnetic Media
 Optical Media
 Electronic Media
 Security Topologies
 Security Zones
 VLANs
 NAT
 Tunneling
 Ghapter Review
Chapter 11 Remote Access
 The Remote Access Process
 Identification
 Authentication
 Authorization
 Telnet
 SSH
 L2TP and PPIp
 PPIP
 L2TP
 IEEE 802.11
 VPN
 IPSec
 IPSec Configurations
 IPSec Security
 IEEE 802. Ix
 RADIUS
 RADIUS Authentication
 RADIUS Authorization
 RADIUS Accounting
 DIAMETER
 TACACS+
 TACACS+ Authentication
 TAGACS+ Authorization
 TAGAGS+ Accounting
 Vulnerabilities
 Connection Summary
 Ghapter Review
Chapter 12 Wireless and Instant Hessaging
 Wireless
 WAP and WTLS
 802.11
 Instant Messaging
 Chapter Review
Chapter 13 Intrusion Detection Systems
 History of Intrusion Detectiion Systems
 IDS Overview
 Host-Based Intrusion Detection Systems
 Advantages of Host-Based IDSs
 Disadvantages of Host-Based IDSs
 Active vs. Passive Host-Based IDSs
 Network-Based Intrusion Detection Systems
 Advantages of a Network-Based IDS
 Disadvantages of a Network-Based 1DS
 Active vs. Passive Network-Based IDSs
 Signatures
 False Positives and Negatives
 IDS Models
 Preventative Intrusion Detection Systems
 IDS Products and Vendors
 Honeypots
 Incident Response
 Ghapter Review
Chapter 14 Security Baselines
 Oven, Jew Baselines
 Password Selection
 Password Polio/Guidelines
 Selecting a Password
 Components of a Good Password
 Password Aging
 Operating System and Network Operating System Hardening
 Hardening Microsoft Operating Systems
 Hardening UNIX-or Linux-BaSed Operating Systems
 Network Hardening
 Software Updates
 Device Configuration
 Ports and Services
 Traffic Filtering
 Application Hardening
 Application Patches
 Web Servers
 Mall Servers
 FIP Servers
 DNS Servers
 File and Print Services
 Active Directory
 Chapter Review
Chapter 15 Attacks and Malware
 Attacking Computer Systems and Networks
 DeniM-of-Service Attacks
 Backdoors and Trapdoors
 Sniffing
 Spoofing
 Man-in-the-Middle Attacks
 Replay Attacks
 TCP/IP Hijacking
 Attacks on Encryption
 Password Guessing
 Software Exploitation
 Wardialing and WarDriving
 Social Engineering
 Malware
 Auditing
 Chapter Review
Chapter 16 E-mail
 Security of E-mail Transmissions
 Malidous Code
 Hoax E-mails
 Unsolicited Commercial E-mail (Spare)
 Mail Encrypfon
 Chapter Review
Chapter 17 Web Components
 Current Web Components and Concerns
 Protocols
 Encryption (SSL and TLS)
 The Web (HTTP and HTIPS)
 Web Services
 Directory Services (DAP and LDAP)
 File Transfer (FIT and SFTP)
 Vulnerabilities
 Code-Based Vulnerabilities
 Buffer Overflows
 Java and IavaScript
 ActiveX
 CGI
 Server-Side Scripts
 Cookies
 Signed Applets
 Browser Plug-Ins
 Chapter Review
Chapter 18 Software Development
 The Software EngineeeingProcess
 Process Models
 ROI and Error Correction
 Secure Code Techniques
 Good Practices
 Requirements
 Testing
 Chapter Review
Chapter 19 Disaster Recovery, Business Continuity, and Organizational Policies
 Disaster Recovery
 Disaster Recovery Plans/Process
 Backups
 Utilities
 Secure Recovery
 High Availability and Fault Tolerance
 Computer Incident Response Teams
 Test, Exercise, and Rehearse
 Policies and Procedures
 Security Policies
 Privacy
 Service Level Agreements
 Human Resources Policies
 Code of Ethics
 Incident Response Policies
 Chapter Review
Chapter 20 Risk Management
 An Overview of Risk Management
 Macro-Level Example of Risk Management
 International Banking
 Key Terms Essential to Understanding Risk Management
 What Is Risk Management?
 Business Risks
 Examples of Business Risks
 Examples of Technology Risks
 Risk Management Models
 General Risk Management Model
 Software Engineering Institute Model
 Qualitatively Assessing Risk
 Quantitatively Assessing Risk
 Qualitative vs. Quantitative Risk Assessmem
 Tools
 Chapter Review
Chapter 21 Change Management
 Why Change Management?
 The Key Concept: Segregation of Duties
 Elements of Change Management
 Implementing Change Management
 The Purpose of a Change Control Board
 Code Integrity
 The Capability Maturity Model
 Chapter Review
Chapter 22 Privilege Management
 User, Group, and Role Management
 User.
 Groups
 Role
 Single Sign-On
 Centralized vs. Decentralized Management
 Centralized Management
 Decentralized Management
 The Decentralized, Gentralized Model
 Auditing (Privilege, Usage, and Escalation)
 Privilege Auditing
 Usage Auditing
 Escalation Auditing
 Handling Access Control (MAC, DAC, and RBAC)
 Mandatory Access Control (MAC)
 Discretionary Access Control (DAC)
 Role-Based Access Control (RBAC)
 Chapter Review
Chapter 23 Computer Forensics
 Evidence
 Standards for Evidence
 Types of Evidence
 Three Rules Regarding Evidence
 Collecting Evidence
 Acquiring Evidence
 Identifying Evidence
 Protecting Evidence
 Transporting Evidence
 Storing Evidence
 Conducting the Investigation
 Chain of Custody
 Free Space vs. Slack Space
 Free Space
 Slack Space
 What's This Message Digest and Hash?
 Analysis
 Chapter Review
Chapter 24 Security and Law
 Import/Export Encryption Restrictions
 United States Law
 Non-U.S. Laws
 Digital Signature Laws
 Non-U.S. Laws
 Digital Rights Management
 Privacy Laws
 United States Laws
 European Laws
 Computer Trespass
 Convention on Cybercrime
 Ethics
 Chapter Review
 Glossary
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網(wǎng)安備 42010302001612號