注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全網(wǎng)絡(luò)安全基礎(chǔ)應(yīng)用與標(biāo)準(zhǔn)(第3版)

網(wǎng)絡(luò)安全基礎(chǔ)應(yīng)用與標(biāo)準(zhǔn)(第3版)

網(wǎng)絡(luò)安全基礎(chǔ)應(yīng)用與標(biāo)準(zhǔn)(第3版)

定 價(jià):¥39.00

作 者: (美)斯托林斯 著
出版社: 清華大學(xué)出版社
叢編項(xiàng):
標(biāo) 簽: 信息安全

購(gòu)買這本書(shū)可以去


ISBN: 9787302154518 出版時(shí)間: 2007-08-01 包裝: 平裝
開(kāi)本: 16開(kāi) 頁(yè)數(shù): 411 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  本書(shū)由著名作者William Stallings編寫,完全從實(shí)用的角度出發(fā),用較小的篇幅對(duì)當(dāng)前網(wǎng)絡(luò)安全解決方案中使用的主要算法、重要協(xié)議和系統(tǒng)管理方法等內(nèi)容做了全面而詳細(xì)的介紹。全書(shū)共分為三部分:(1)密碼算法和協(xié)議,包括網(wǎng)絡(luò)安全應(yīng)用中最常用的密碼算法和協(xié)議;(2)網(wǎng)絡(luò)安全應(yīng)用,介紹了網(wǎng)絡(luò)安全解決方案中使用的各種安全協(xié)議,如Kerberos、PGP、S/MIME、IPSeC、SSI/TLS和SET等;(3)系統(tǒng)安全,介紹了一些系統(tǒng)級(jí)的安全問(wèn)題,如網(wǎng)絡(luò)入侵、惡意軟件和防火墻等。每章后面都提供了一定數(shù)量的推薦讀物、網(wǎng)址、思考題和習(xí)題等。全書(shū)最后還提供了一定數(shù)量的項(xiàng)目作業(yè)。為方便使用本教材的教師搞好教學(xué),出版社還提供了較為完整的配套服務(wù)。與本書(shū)的前兩版相比,第3版除在語(yǔ)言和敘述方面做進(jìn)一步加工提高外,主要增加的內(nèi)容包括RC4算法、公鑰基礎(chǔ)設(shè)施(PKI)、分布式拒絕服務(wù)攻擊(DDos)和信息技術(shù)安全評(píng)估通用準(zhǔn)則等。本書(shū)既可作為我國(guó)高校相關(guān)課程的教材使用,又是滿足普通網(wǎng)絡(luò)安全愛(ài)好者學(xué)習(xí)和了解網(wǎng)絡(luò)安全基本知識(shí)的一本難得好書(shū)。

作者簡(jiǎn)介

暫缺《網(wǎng)絡(luò)安全基礎(chǔ)應(yīng)用與標(biāo)準(zhǔn)(第3版)》作者簡(jiǎn)介

圖書(shū)目錄

Preface
Chapter 1 Introduction
1.1 Security Trends
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Internetwork Security
1.7 Internet Standards the Internet Society
1.8 Outline of This Book
1.9 Recommended Reading
1.10 Internet andWeb Resources
1.11 Key Terms, Review Questions, and Problems
PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Stream Ciphers and RC4
2.4 Cipher Block Modes of Operation
2.5 Location of Encryption Devices
2.6 Key Distribution
2.7 Recommended Reading andWeb Sites
2.8 Key Terms, Review Questions, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions and HMAC
3.3 Public Key Cryptography Principles
3.4 Public-Key Cryptography Algorithms
3.5 Digital Signatures
3.6 Key Management
3.7 Recommended Reading andWeb Sites
3.8 Key Terms, Review Questions, and Problems
PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Authentication Applications
4.1 Kerberos 95
4.2 X.509 Directory Authentication Service
4.3 Public Key Infrastructure
4.4 Recommended Reading and Web Sites
4.4 Key Terms, Review Questions, and Problems
Appendix 4A: Kerberos Encryption Techniques
Chapter 5 Electronic Mail Security
5.1 Pretty Good Privacy (PGP)
5.2 S/MIME
5.3 Recommended Web Sites
5.4 Key Terms, Review Questions, and Problems
Appendix 5A: Data Compression Using ZIP
Appendix 5B: Radix-64 Conversion
Appendix 5C: PGP Random Number Generation
Chapter 6 IP Security
6.1 IP Security Overview
6.2 IP Security Architecture
6.3 Authentication Header
6.4 Encapsulating Security Payload
6.5 Combining Security Associations
6.6 Key Management 200
6.7 Recommended Reading andWeb Sites
6.8 Key Terms, Review Questions, and Problems
Appendix 6A: Internetworking and Internet Protocols
Chapter 7 Web Security
7.1 Web Security Requirements
7.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
7.3 Secure Electronic Transaction (SET)
7.4 Recommended Reading and Web Sites
7.5 Key Terms, Review Questions, and Problems
Chapter 8 Network Management Security
8.1 Basic Concepts of SNMP
8.2 SNMPvl Community Facility
8.3 SNMPv3 269
8.4 Recommended Reading and Web Sites
8.5 Key Terms, Review Questions, and Problems
PART THREE SYSTEM SECURITY
Chapter 9 Intruders
9.1 Intruders
9.2 Intrusion Detection
9.3 Password Management
9.4 Recommended Reading and Web Sites
9.5 Key Terms, Review Questions, and Problems
Appendix 9A:The Base-Rate Fallacy
Chapter 10 Malicious Sofrware
Chapter 11 Firewalls
APPENDICES
AppendixA Some Aspects of Number THeory
AppendixB Projects for Teaching Network Security
Glossary
References
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)