Chapter 1 Hacker Attack Technology 1.1 Definition and Classification of Attack 1.2 The Process or Methodology Hackers Use to Attack 1.3 The Methods and Ways of Attack Chapter 2 Cryptography 2.1 Cryptography Introduction 2.2 Substitution Cryptography 2.3 Symmetric-key Cry6ptography 2.4 Public-key Cryptography 2.5 Cryptographic Hash Function Chapter 3 Firewall 3.1 Introduction 3.2 Firewall Technologies 3.3 Firewall Architectures 3.4 Windows Firewall 3.5 Problems and Benefits of Firewall Chapter 4 Intrusion Detection System 4.1 Introduction 4.2 State of the Art 4.3 Data Collection 4.4 Data Processing for Detection 4.5 Alarms, Logs and Actions 4.6 Example: Data Mining Approaches for IDS 4.7 Known Problems with IDS Chapter 5 Network Security Protocol 5.1 Introduction 5.2 Kerberos Protocol …… Chapter 6 Virtual Private Network Chapter 7 Computer Virus Chapter 8 Public-Key Infrastructure Chapter 9 Information Security Management 參考文獻(xiàn)