您好,欢迎光临有路网!
网络安全基础教程:应用与标准第2版
QQ咨询:
有路璐璐:

网络安全基础教程:应用与标准第2版

  • 作者:斯托林斯
  • 出版社:清华大学出版社
  • ISBN:9787302077930
  • 出版日期:2004年01月01日
  • 页数:409
  • 定价:¥39.00
  • 分享领佣金
    手机购买
    城市
    店铺名称
    店主联系方式
    店铺售价
    库存
    店铺得分/总交易量
    发布时间
    操作

    新书比价

    网站名称
    书名
    售价
    优惠
    操作

    图书详情

    内容提要
    本书是**作者William Stallings的力作之一,详细介绍了网络**的基础知识、应用及标准。全书共分为三部分:(1)密码算法和协议,包括网络应用中的密码算法和协议;(2)网络**应用,介绍了一些主要的网络**工具和应用,如Kerberos、x.509v3证书、PGP、S/MIME、IP**、SSL/TLS、SET以及SNMPv3等;(3)系统**,介绍了一些系统级的**问题,如网络入侵与病毒的危害及对策,防火墙和托管系统的应用等。此外,每章后面都提供了一定的练习和复习题,以便于读者对所学知识的巩固。第2版新增**加密标准的讨论,对病毒、蠕虫及非法入侵的论述也进行了扩充。而且,教师和学习还可以通过访问www.WilliamStallings.com/NetSec2e.html来获取补充材料。
    本书可作为计算机科学、计算机工程、电子工程等相关专业本科生的网络**课程教材,也是网络**从业人员的自学用书。
    目录
    CHAPTER 1 INTRODUCTION
    1.1 The OSI Security Architecture
    1.2 Security Attacks
    1.3 Security Services
    1.4 Security mechanisms
    1.5 A Model for Network Security
    1.6 Internet Standards and the Internet Society
    1.7 Outline of This Book
    1.8 Recommended Reading
    1.9 Internet and Web Resources
    PART ONE CRYPTOGRAPHY
    CHAPTER 2 SYMMETRIC ENCRYPTION AND MESSAGE CONFIDENTIALITY
    2.1 Symmetric Encryption Principles
    2.2 Symmetric Encryption Algorithms
    2.3 Cipher Block Modes of Operation
    2.4 Location of Encryption Devices
    2.5 Key Distribution
    2.6 Recommended Reading and Web Sites
    2.7 Key Terms,Review Questions,and Problems
    CHAPTER 3 PUBLIC-KEY CRYPTOGRAPHY AND MESSAGE AUTHENTICATION
    3.1 Approaches to Message Authentication
    3.2 Secure Hash Functions and HMAC
    3.3 Public-Key Cryptography Principles
    3.4 Public-Key Cryptography Algorithms
    3.5 Digital Signatures
    3.6 Key Management
    3.7 Recommended Reading and Web Sites
    3.8 Key Terms,Review Questions,and Problems
    PART TWO NETWORK SECURITY APPLICATIONS
    CHAPTER 4 AUTHENTICATION APPLICATIONS
    4.1 Kerberos
    4.2 X.509 Authentication Service
    4.3 Recommended Reading and Web Sites
    4.4 Key Terms,Review Questions,and Problems
    Appendix 4A Kerberos Encryption Techniques
    CHAPTER 5 ELECTRONIC MAIL SECURITY
    5.1 Pretty Good Privacy
    5.2 S/MIME
    5.3 Recommended Web Sites
    5.4 Key Terms,Review Questions,and Problems
    Appendix ** Data Compression Using Zip
    Appendix 5B RADIX-64 Conversion
    Appendix 5C PGP Random Number Generation
    CHAPTER 6 IP SECURITY
    6.1 IP Security Overview
    6.2 IP Security Architecture
    6.3 Authenticastion Header
    6.4 Encapsulating Security Payload
    6.5 Combining Security Associations
    6.6 Key Management
    6.7 Recommended Reading and Web Sites
    6.8 Key Terms,Review Ouestions,and Problems
    Appendix 6A Internetworking and Internet Protocols
    CHAPTER 7 WEB SECURITY
    7.1 Web Security Considerations
    7.2 Secure Socket Layer and Transport Layer Security
    7.3 Secure Electronic Transaction
    7.4 Recommended Reading and Web Sites
    7.5 Key Terms,Review Questions,and Problems
    CHAPTER 8 NETWORK MANAGEMENT SECURITY
    8.1 Basic Concepts of SNMP
    8.2 SNMPv1 Community Facility
    8.3 SNMPv3
    8.4 Recommended Reading and Web Sites
    8.5 Key Terms,Review Questions,and Problems
    PART THREE SYSTEM SECURITY
    CHAPTER 9 INTRUDERS
    9.1 Intruders
    9.2 Intrusion Detection
    9.3 Password Management
    9.4 Recommended Reading and Web Sites
    9.5 Key Terms,Review Questions,and Problems
    Appendix 9A The Base-Rate Fallacy
    CHAPTER 10 MALICIOUS SOFTWARE
    10.1 Viruses and Related Threats
    10.2 Virus Countermeasures
    10.3 Recommended Reading and Web Site
    10.4 Key Terms,Review Questions,and Problems
    APPENDICES
    APPENDIX A STANDARDS CITED IN THIS BOOK
    A.1 ANSI Standards
    A.2 Internet RFGs
    A.3 ITU-T Recommendations
    A.4 NIST Federal Information Processing Standards
    APPENDIX B SOME ASPECTS OF NUMBER THEORY
    B.1 Prime and Relatively Prime Numbers
    B.2 Modular Arithmetic
    GLOSSARY
    REFERENCES
    INDEX

    与描述相符

    100

    北京 天津 河北 山西 内蒙古 辽宁 吉林 黑龙江 上海 江苏 浙江 安徽 福建 江西 山东 河南 湖北 湖南 广东 广西 海南 重庆 四川 贵州 云南 西藏 陕西 甘肃 青海 宁夏 新疆 台湾 香港 澳门 海外