图书介绍

网络安全基础应用与标准 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

网络安全基础应用与标准 英文版
  • (美)斯托林斯(Stallings,W.)著 著
  • 出版社: 北京:清华大学出版社
  • ISBN:9787302229728
  • 出版时间:2010
  • 标注页数:417页
  • 文件大小:108MB
  • 文件页数:432页
  • 主题词:计算机网络-安全技术-高等学校-教材-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

网络安全基础应用与标准 英文版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 Introduction1

1.1 Computer Security Concepts3

1.2 The OSI Security Architecture8

1.3 Security Attacks9

1.4 Security Services13

1.5 Security Mechanisms16

1.6 A Model for Network Security19

1.7 Standards21

1.8 Outline of This Book21

1.9 Recommended Reading22

1.10 Internet and Web Resources23

1.11 Key Terms,Review Questions,and Problems25

PART ONE CRYPTOGRAPHY27

Chapter 2 Symmetric Encryption and Message Confidentiality27

2.1 Symmetric Encryption Principles28

2.2 Symmetric Block Encryption Algorithms34

2.3 Random and Pseudorandom Numbers42

2.4 Stream Ciphers and RC445

2.5 Cipher Block Modes of Operation50

2.6 Recommended Reading and Web Sites55

2.7 Key Terms,Review Questions,and Problems56

Chapter 3 Public-Key Cryptography and Message Authentication61

3.1 Approaches to Message Authentication62

3.2 Secure Hash Functions67

3.3 Message Authentication Codes73

3.4 Public-Key Cryptography Principles79

3.5 Public-Key Cryptography Algorithms83

3.6 Digital Signatures90

3.7 Recommended Reading and Web Sites90

3.8 Key Terms,Review Questions,and Problems91

PART TWO NETWORK SECURITY APPLICATIONS97

Chapter 4 Key Distribution and User Authentication97

4.1 Symmetric Key Distribution Using Symmetric Encryption98

4.2 Kerberos99

4.3 Key Distribution Using Asymmetric Encryption114

4.4 X.509 Certificates116

4.5 Public-Key Infrastructure124

4.6 Federated Identity Management126

4.7 Recommended Reading and Web Sites132

4.8 Key Terms,Review Questions,and Problems133

Chapter 5 Transport-Level Security139

5.1 Web Security Considerations140

5.2 Secure Socket Layer and Transport Layer Security143

5.3 Transport Layer Security156

5.4 HTTPS160

5.5 Secure Shell(SSH)162

5.6 Recommended Reading and Web Sites173

5.7 Key Terms,Review Questions,and Problems173

Chapter 6 Wireless Network Security175

6.1 IEEE 802.11 Wireless LAN Overview177

6.2 IEEE 802.11i Wireless LAN Security183

6.3 Wireless Application Protocol Overview197

6.4 Wireless Transport Layer Security204

6.5 WAP End-to-End Security214

6.6 Recommended Reading and Web Sites217

6.7 Key Terms,Review Questions,and Problems218

Chapter 7 Electronic Mail Security221

7.1 Pretty Good Privacy222

7.2 S/MIME241

7.3 DomainKeys Identified Mail257

7.4 Recommended Reading and Web Sites264

7.5 Key Terms,Review Questions,and Problems265

Appendix 7A Radix-64 Conversion266

Chapter 8 IP Security269

8.1 IP Security Overview270

8.2 IP Security Policy276

8.3 Encapsulating Security Payload281

8.4 Combining Security Associations288

8.5 Internet Key Exchange292

8.6 Cryptographic Suites301

8.7 Recommended Reading and Web Sites302

8.8 Key Terms,Review Questions,and Problems303

PART THREE SYSTEM SECURITY305

Chapter 9 Intruders305

9.1 Intruders307

9.2 Intrusion Detection312

9.3 Password Management323

9.4 Recommended Reading and Web Sites333

9.5 Key Terms,Review Questions,and Problems334

Appendix 9A The Base-Rate Fallacy337

Chapter 10 Malicious Software340

10.1 Types of Malicious Software341

10.2 Viruses346

10.3 Virus Countermeasures351

10.4 Worms356

10.5 Distributed Denial of Service Attacks365

10.6 Recommended Reading and Web Sites370

10.7 Key Terms,Review Questions,and Problems371

Chapter 11 Firewalls374

11.1 The Need for Firewalls375

11.2 Firewall Characteristics376

11.3 Types of Firewalls378

11.4 Firewall Basing385

11.5 Firewall Location and Configurations388

11.6 Recommended Reading and Web Site393

11.7 Key Terms,Review Questions,and Problems394

APPENDICES398

Appendix A Some Aspects of Number Theory398

A.1 Prime and Relatively Prime Numbers399

A.2 Modular Arithmetic401

Appendix B Projects for Teaching Network Security403

B.1 Research Projects404

B.2 Hacking Project405

B.3 Programming Projects405

B.4 Laboratory Exercises406

B.5 Practical Security Assessments406

B.6 Writing Assignments406

B.7 Reading/Report Assignments407

Index408

ONLINE CHAPTERS3

Chapter 12 Network Management Security12.1 Basic Concepts of SNMP12.2 SNMPv1 Community Facility12.3 SNMPv3

12.4 Recommended Reading and Web Sites12.5 Key Terms,Review Questions,and ProblemsChapter 13 Legal and Ethical Aspects13.1 Cybercrime and Computer Crime13.2 Intellectual Property13.3 Privacy13.4 Ethical Issues13.5 Recommended Reading and Web Sites13.6 Key Terms,Review Questions,and ProblemsONLENE APPENDICESAppendix C Standards and Standards-Setting OrganizationsC.1 The Importance of StandardsC.2 Internet Standards and the Internet SocietyC.3 National Institute of Standards and TechnologyAppendix D TCP/IP and OSID.1 Protocols and Protocol ArchitecturesD.2 The TCP/IP Protocol ArchitectureD.3 The Role of an Internet ProtocolD.4 IPv4

D.5 IPv6

热门推荐