網(wǎng)絡(luò)安全基礎(chǔ)應(yīng)用與標(biāo)準(zhǔn)

出版時間:2007-8  出版社:清華大學(xué)出版社  作者:斯托林斯  頁數(shù):413  
Tag標(biāo)簽:無  

內(nèi)容概要

  本書由著名作者William StaUilags編寫,完全從實用的角度出發(fā),用較小的篇幅對當(dāng)前網(wǎng)絡(luò)安全解決方案中使用的主要算法、重要協(xié)議和系統(tǒng)管理方法等內(nèi)容做了全面而詳細(xì)的介紹。全書共分為三部分:(1)密碼算法和協(xié)議,包括網(wǎng)絡(luò)安全應(yīng)用中最常用的密碼算法和協(xié)議;(2)網(wǎng)絡(luò)安全應(yīng)用,介紹了網(wǎng)絡(luò)安全解決方案中使用的各種安全協(xié)議,如Kerberos、PGP、S/MIME、IPSec、SSL/TLS和SET等; (3)系統(tǒng)安全,介紹了一些系統(tǒng)級的安全問題,如網(wǎng)絡(luò)入侵、惡意軟件和防火墻等。每章后面都提供了一定數(shù)量的推薦讀物、網(wǎng)址、思考題和習(xí)題等。全書最后還提供了一定數(shù)量的項目作業(yè)。為方便使用本教材的教師搞好教學(xué),出版社還提供了較為完整的配套服務(wù)。與本書的前兩版相比,第3版 除在語言和敘述方面做進一步加工提高外,主要增加的內(nèi)容包括RC4算法、公鑰基礎(chǔ)設(shè)施(PKI)、分布式拒絕服務(wù)攻擊(DDos)和信息技術(shù)安全評估通用準(zhǔn)則等?!”緯瓤勺鳛槲覈咝O嚓P(guān)課程的教材使用,又是滿足普通網(wǎng)絡(luò)安全愛好者學(xué)習(xí)和了解網(wǎng)絡(luò)安全基本知識的一本難得好書。

作者簡介

作者:(美國)斯托林斯

書籍目錄

PrefaceChapter 1 Introduction1.1 Security Trends1.2 The OSI Security Architecture1.3 Security Attacks1.4 Security Services1.5 Security Mechanisms1.6 A Model for Internetwork Security1.7 Internet Standards the Internet Society1.8 Outline of This Book1.9 Recommended Reading1.10 Internet andWeb Resources1.11 Key Terms, Review Questio, and ProblemsPART ONE CRYPTOGRAPHYChapter 2 Symmetric Encryption and Message Confidentiality2.1 Symmetric Encryption Principles2.2 Symmetric Block Encryption Algorithms2.3 Stream Ciphe and RC2.4 Cipher Block Modes of Operation2.5 Location of Encryption Devices2.6 Key Distribution2.7 Recommended Reading andWeb Sites2.8 Key Terms, Review Questio, and ProblemsChapter 3 Public-Key Cryptography and Message Authentication3.1 Approaches to Message Authentication3.2 Secure Hash Functio and HMAC3.3 Public Key Cryptography Principles3.4 Public-Key Cryptography Algorithms3.5 Digital Signatures3.6 Key Management3.7 Recommended Reading andWeb Sites3.8 Key Terms, Review Questio, and ProblemsPART TWO NETWORK SECURITY APPLICATIONSChapter 4 Authentication Applicatio4.1 Kerberos4.2 X.509 Directory Authentication Service4.3 Public Key Infrastructure4.4 Recommended Reading and Web Sites4.4 Key Terms, Review Questio, and ProblemsAppendix 4A: Kerberos Encryption TechniquesChapter 5 Electronic Mail Security5.1 Pretty Good Privacy (PGP)5.2 S/MIME5.3 Recommended Web Sites5.4 Key Terms, Review Questio, and ProblemsAppendix 5A: Data Compression Using ZIPAppendix 5B: Radix-64 ConveionAppendix 5C: PGP Random Number GenerationChapter 6 IP Security6.1 IP Security Overview6.2 IP Security Architecture6.3 Authentication Header6.4 Encapsulating Security Payload6.5 Combining Security Associatio6.6 Key Management6.7 Recommended Reading andWeb Sites6.8 Key Terms, Review Questio, and ProblemsAppendix 6A: Internetworking and Internet ProtocolsChapter 7 Web Security7.1 Web Security Requirements7.2 Secure Sockets Layer (SSL) and Traport Layer Security (TLS)7.3 Secure Electronic Traaction (SET)7.4 Recommended Reading and Web Sites7.5 Key Terms, Review Questio, and ProblemsChapter 8 Network Management Security8.1 Basic Concepts of SNMP8.2 SNMPvl Community Facility8.3 SNMPv8.4 Recommended Reading and Web Sites8.5 Key Terms, Review Questio, and ProblemsPART THREE SYSTEM SECURITYChapter 9 Intrude9.1 Intrude9.2 Intrusion Detection9.3 Password Management9.4 Recommended Reading and Web Sites9.5 Key Terms, Review Questio, and ProblemsAppendix 9A:The Base-Rate FallacyChapter 10 Malicious Software10.1 Viruses and Related Threats10.2 Virus Countermeasures10.3 Distributed Denial of Service Attacks10.4 R ecommended Reading andWeb Sites10.5 Key Terms, Review Questio, and ProblemsChapter 11 Firewalls11.1 Firewall Design Principles11.2 Trusted Systems11.3 Common Criteria for Information Technology Security Evaluation11.4 Recommended Reading and Web Sites11.5 KeyTerms, Review Questio,and ProblemsAPPENDICESAppendix A Some Aspects of Number TheoryA.1 Prime and Relatively Prime NumbeA.2 Modular ArithmeticAppendix B Projects for Teaching Network SecurityB.1 Research ProjectsB.2 Programming ProjectsB.3 Laboratory ExercisesB.4 Writing AssignmentsB.5 Reading/Report AssignmentsGlossaryReferencesIndex

圖書封面

圖書標(biāo)簽Tags

評論、評分、閱讀與下載


    網(wǎng)絡(luò)安全基礎(chǔ)應(yīng)用與標(biāo)準(zhǔn) PDF格式下載


用戶評論 (總計7條)

 
 

  •   拿到了才知道,里面是全英文的。商品信息里也沒標(biāo)注啊。有點。。。
  •   這本書我認(rèn)為不錯,深入淺出,可以作為高校有關(guān)網(wǎng)絡(luò)安全專業(yè)方向的教材,但書中有多處錯誤,可能是校對不夠仔細(xì),希望再版時能修正過來。
  •   倍兒有面子的書。與另外一本數(shù)據(jù)庫并為書架上最有面子的書,放在最顯眼的位置。勸大家不習(xí)慣看英文還是買本翻譯的吧……
  •   連個封面都沒有,其實這是英文版的書害我買回來當(dāng)枕頭
  •   這次在亞馬遜買的這本書,上面竟然還寫著用過此書的人的名字,年級,學(xué)院,以及其科任老師的名字,郵箱,手機號,我查了一下,是武漢的手機號,剛好在買這本書時,買了一點武漢的特產(chǎn)--周黑鴨,估計就是從武漢調(diào)過來的用過的書,汗~~~~~~~~
  •   書的質(zhì)量不錯,送貨也挺快
  •   這是英文版還是中文版
 

250萬本中文圖書簡介、評論、評分,PDF格式免費下載。 第一圖書網(wǎng) 手機版

京ICP備13047387號-7