出版時間:2013-1 出版社:高等教育出版社 作者:王雙保,(美)萊德利 著 頁數:321 字數:490000
Tag標簽:無
前言
This book provides the fundamentals of computer architecture and security. It covers a wide range of computer hardware, system software and data concepts from a security perspective. It is essential for computer and information security professio-nals to understand both hardware and software security solutions to thrive in the workplace. It features a careful, in-depth, and innovative introduction to modern computer systems and patent-pending technologies in computer security. In the past, computers were designed without security considerations. Later,firewalls were used to protect them from outside attacks. This textbook inte-grates security considerations into computer architecture in a way that it is immune from attacks. When necessary, the author creates simplified examples from patent-pending technologies that clearly explain architectural and imple-mentation features. This book is intended for graduate and undergraduate students, engineers, and researchers who are interested in secure computer architecture and systems. This book is essential for anyone who needs to understand, design or implement a secure computer system. Studying computer architecture from a security perspective is a new area. There are many textbooks about computer architecture and many others about computer security. However, textbooks introducing computer architecture with security as the main theme are rare. This book introduces not only how to secure computer compo-nents (Memory, I/O, network interfaces and CPU) but also how to secure the entire computer system. The book proposes a new model that changes the Neumann archi-tecture that has been the foundation of modern computers since 1945. The book includes the most recent patent-pending technology in computer architecture for security. It also incorporates experiences from the author's recent award-winning teaching and research. This book also introduces the latest technologies, such as virtualization, cloud computing, Internet computing, ubiquitous computing, biocomputers and other advanced computer architectures, into the classroom in order to shorten the transi-tion time from student to employee.
內容概要
在當今的計算機和信息系統(tǒng)應用設計中,計算機和信息安全專業(yè)人員必須同時了解硬件和軟件才能有效地部署安全解決方案?!缎畔踩盗校河嬎銠C體系結構與安全(英文版)》從安全的角度對計算機和網絡硬件、系統(tǒng)軟件、信息和數據的概念進行全面的闡述,并為讀者提供實現(xiàn)安全的計算機和信息系統(tǒng)的解決方案和工具;此外,在計算機安全、信息集成設計與實踐經驗方面還介紹了現(xiàn)代計算機系統(tǒng)以及作者所擁有的一些專利技術,以使讀者更好地掌握和應用計算機安全系統(tǒng)的知識?!缎畔踩盗校河嬎銠C體系結構與安全(英文版)》可作為高等學校計算機、電子與通信以及信息安全學科高年級本科生和研究生教材,也可供相關專業(yè)研究人員、安全專家以及工程師參考。
作者簡介
Shuangbao(Paul)Wang美國喬治·梅森大學副教授,曾任美國國家生物醫(yī)學基金會信息技術總裁、青島市科技信息研究所所長;獲美國先進模擬和培訓LINK學者獎1項,科技獎勵18項;擁有專利4項,其中3項已實現(xiàn)轉讓并投產,研究成果在美國“產業(yè)化周”列為最佳發(fā)明獎:1篇論文列入《科學快線》25篇優(yōu)秀論文之首。
Robert S.
Ledley美國喬治敦大學教授,美國科學院院士,美國國家生物醫(yī)學基金會主席,計算機斷層掃描(CT)的發(fā)明人。兼任4個國際期刊的主編,撰寫了多部專著,擁有專利和基金項目百余項,獲1997年美國總統(tǒng)頒發(fā)的“國家技術獎”,被評為1990年國家優(yōu)秀發(fā)明人才。
書籍目錄
1 Introduction to Computer Architecture and Security
1.1 History of Computer Systems
1.1.1 Timeline of Computer History
1.1.2 Timeline of Internet History
1.1.3 Timeline of Computer Security History
1.2 John von Neumann Computer Architecture
1.3 Memory and Storage
1.4 Input1Output and Network Interface
1.5 Single CPU and Multiple CPU Systems
1.6 Overview of Computer Security
1.6.1 Confidentiality
1.6.2 Integrity
1.6.3 Availability
1.6.4 Threats
1.6.5 Firewalls
1.6.6 Hacking and Attacks
1.7 Security Problems in Neumann Architecture
1.8 Summary
Exercises
References
2 Digital Logic Design
2.1 Concept of Logic Unit
2.2 Logic Functions and Truth Tables
2.3 Boolean Algebra
2.4 Logic Circuit Design Process
2.5 Gates and Flip-Flops
2.6 Hardware Security
2.7 FPGA and VLSI
2.7.1 Design of an FPGA Biometric Security System
2.7.2 A RIFD Student Attendance System
2.8 Summary
Exercises
References
3 Computer Memory and Storage
3.1 A One Bit Memory Circuit
3.2 Register, MAR, MDR and Main Memory
3.3 Cache Memory
3.4 Virtual Memory
3.4.1 Paged Virtual Memory
3.4.2 Segmented Virtual Memory
3.5 Non-Volatile Memory
3.6 External Memory
3.6.1 Hard Disk Drives
3.6.2 Tertiary Storage and Off-Line Storage
3.6.3 Serial Advanced Technology Attachment (SATA)
3.6.4 Small Computer System Interface (SCSI)
3.6.5 Serial Attached SCSI (SAS)
3.6.6 Network-Attached Storage (NAS)
3.6.7 Storage Area Network (SAN)
3.6.8 Cloud Storage
3.7 Memory Access Security
3.8 Summary
Exercises
References
4 Bus and Interconnection
4.1 System Bus
4.1.1 Address Bus
4.1.2 Data Bus
4.1.3 Control Bus
4.2 Parallel Bus and Serial Bus
4.2.1 Parallel Buses and Parallel Communication
4.2.2 Serial Bus and Serial Communication
4.3 Synchronous Bus and Asynchronous Bus
……
5 I/O and network interface
6 Central processing unit
7 advanced computer architecture
8 assembly language and operating systems
9 TCP/IP and internet
10 design and implementation: modifying Neumann architecture
Appendix a digital logic simulators
Appendix b computer security tools
Appendix c patent application: intrusion-free computer architecture
for information and data security
Index
章節(jié)摘錄
版權頁: 插圖: In modem computers,hard disk drives are usually used as secondary storage.Thetime taken to access a given byte of information stored on a hard disk is typically afew thousandths of a second,or milliseconds.By contrast,the time taken to access agiven byte of information stored in random access memory is measured in billionthsof a second,or nanoseconds.This illustrates the significant accesstime differencewhich distinguishes solidstate memory from rotating magnetic storage devices:hard disks are typically about a million times slower than memory.Rotating opticalstorage devices,such as CD and DVD drives,have even longer access times.Withdisk drives,once the disk read/write head reaches the proper placement and the dataof interest rotates under it,subsequent data on the track are very fast to access.As aresult,in order to hide the initial seek time and rotational latency,data are transferredto and from disks in large contiguous blocks. When data reside on disk,block access to hide latency offers a ray of hope indesigning efficient external memory algorithms.Sequential or block access ondisks is orders of magnitude faster than random access,and many sophisticatedparadigms have been developed to design efficient algorithms based uponsequential and block access.Another way to reduce the I/O bottleneck is to usemultiple disks in parallel in order to increase the bandwidth between primary andsecondary memory. Some other examples of secondary storage technologies are: flash memory (e.g.,USB flash drives or keys),floppy disks,magnetic tape,paper tape,punched cards,standalone RAM disks,and Iomega Zip drives. The secondary storage is often formatted according to a file system format,whichprovides the abstraction necessary to organize data into files and directories,providing additional information (called metadata) describing the owner of a certain file,the access time,the access permissions,and other information. Most computer operating systems use the concept of virtual memory,allowingutilization of more primary storage capacity than is physically available in the system.As the primary memory fills up,the system moves the leastused chunks(pages) to secondary storage devices (to a swap file or page file),retrieving themlater when they are needed.As more of these retrievals from slower secondary stor-age are necessary,the more the overall system performance is degraded.
編輯推薦
《計算機體系結構與安全》可作為高等學校計算機、電子與通信以及信息安全學科高年級本科生和研究生教材,也可供相關專業(yè)研究人員、安全專家以及工程師參考。
圖書封面
圖書標簽Tags
無
評論、評分、閱讀與下載