注冊 | 登錄讀書好,好讀書,讀好書!
讀書網-DuShu.com
當前位置: 首頁出版圖書科學技術計算機/網絡信息安全信息安全原理與應用(第四版 英文版)

信息安全原理與應用(第四版 英文版)

信息安全原理與應用(第四版 英文版)

定 價:¥79.00

作 者: Charles P.Pfleeger Shari Lawrence Pfleeger
出版社: 電子工業(yè)出版社
叢編項: 國外計算機科學教材系列
標 簽: 信息安全

購買這本書可以去


ISBN: 9787121047442 出版時間: 2007-08-01 包裝: 平裝
開本: 16 頁數(shù): 845 字數(shù):  

內容簡介

  《國外計算機科學教材系列:信息安全原理與應用(第4版)(英文版)》是一本信息安全的經典著作和權威指南,內容新穎豐富。全書系統(tǒng)地描述了計算安全的各方面問題,內容涉及計算機安全的概念和術語;密碼學基礎及應用;程序及軟件安全;操作系統(tǒng)安全及可信任操作系統(tǒng)的設計;數(shù)據(jù)庫及數(shù)據(jù)挖掘的安全;網絡安全;安全管理;計算機安全經濟學;計算安全中的隱私問題;計算安全中的法律和道德問題,最后是對密碼學的深入研究?!秶庥嬎銠C科學教材系列:信息安全原理與應用(第4版)(英文版)》既可以作為信息安全或計算機專業(yè)本科生、研究生的雙語教材,也可以作為相關領域研究人員和專業(yè)技術人員的參考用書。

作者簡介

  Charles P.Pfleeger是一位獨立的信息安全咨詢師和Pfleeger顧問咨詢集團的負責人。從事威脅、漏洞分析、系統(tǒng)設計評審、認證準備、專家鑒定和培訓等。

圖書目錄

Chapter 1  Is There a Security Problem in Computing?
 1.1 What Does "Secure" Mean?
  Protecting Valuables
  Characteristics of Computer Intrusion
 1.2 Attacks
  Vulnerabilities, Threats, Attacks, and Controls
  Method, Opportunity, and Motive
 1.3 The Meaning of Computer Security
  Security Goals
  Vulnerabilities
 1.4 Computer Criminals
  Amateurs
  Crackers or Malicious Hackers
  Career Criminals
  Terrorists
 1.5 Methods of Defense
  Controls
  Effectiveness of Controls
 1.6 What's Next
  Encryption Overview
  Hardware and Software Security
  Human Controls in Security
  Encryption In-Depth
 1.7 Summary
 1.8 Terms and Concepts
 1.9 Where the Field Is Headed
 1.10 To Learn More
 1.11 Exercises
Chapter 2 Elementary Cryptography
 2.1 Terminology and Background
  Terminology
  Representing Characters
 2.2 Substitution Ciphers
  The Caesar Cipher
  Other Substitutions
  One-Time Pads
  Summary of Substitutions
 2.3 Transpositions (Permutations)
  Columnar Transpositions
  Combinations of Approaches
 2.4 Making "Good" Encryption Algorithms
  What Makes a "Secure" Encryption Algorithm?
  Symmetric and Asymmetric Encryption Systems
  Stream and Block Ciphers
  Confusion and Diffusion
  Cryptanaly$is--Breaking Encryption Schemes
 2.5 The Data Encryption Standard
  Background and History
  Overview of the DES Algorithm
  Double and Triple DES
  Security of the DES
 2.6 The AES Encryption Algorithm
  The AES Contest
  Overview of Rijndael
  Strength of the Algorithm
  Comparison of DES and AES
 2.7 Public Key Encryption
  Motivation
  Characteristics
  Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained

本目錄推薦

掃描二維碼
Copyright ? 讀書網 ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號 鄂公網安備 42010302001612號