图书介绍
网络安全基础应用与标准 英文版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- (美)斯托林斯(Stallings,W.)著 著
- 出版社: 北京:清华大学出版社
- ISBN:9787302229728
- 出版时间:2010
- 标注页数:417页
- 文件大小:108MB
- 文件页数:432页
- 主题词:计算机网络-安全技术-高等学校-教材-英文
PDF下载
下载说明
网络安全基础应用与标准 英文版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 Introduction1
1.1 Computer Security Concepts3
1.2 The OSI Security Architecture8
1.3 Security Attacks9
1.4 Security Services13
1.5 Security Mechanisms16
1.6 A Model for Network Security19
1.7 Standards21
1.8 Outline of This Book21
1.9 Recommended Reading22
1.10 Internet and Web Resources23
1.11 Key Terms,Review Questions,and Problems25
PART ONE CRYPTOGRAPHY27
Chapter 2 Symmetric Encryption and Message Confidentiality27
2.1 Symmetric Encryption Principles28
2.2 Symmetric Block Encryption Algorithms34
2.3 Random and Pseudorandom Numbers42
2.4 Stream Ciphers and RC445
2.5 Cipher Block Modes of Operation50
2.6 Recommended Reading and Web Sites55
2.7 Key Terms,Review Questions,and Problems56
Chapter 3 Public-Key Cryptography and Message Authentication61
3.1 Approaches to Message Authentication62
3.2 Secure Hash Functions67
3.3 Message Authentication Codes73
3.4 Public-Key Cryptography Principles79
3.5 Public-Key Cryptography Algorithms83
3.6 Digital Signatures90
3.7 Recommended Reading and Web Sites90
3.8 Key Terms,Review Questions,and Problems91
PART TWO NETWORK SECURITY APPLICATIONS97
Chapter 4 Key Distribution and User Authentication97
4.1 Symmetric Key Distribution Using Symmetric Encryption98
4.2 Kerberos99
4.3 Key Distribution Using Asymmetric Encryption114
4.4 X.509 Certificates116
4.5 Public-Key Infrastructure124
4.6 Federated Identity Management126
4.7 Recommended Reading and Web Sites132
4.8 Key Terms,Review Questions,and Problems133
Chapter 5 Transport-Level Security139
5.1 Web Security Considerations140
5.2 Secure Socket Layer and Transport Layer Security143
5.3 Transport Layer Security156
5.4 HTTPS160
5.5 Secure Shell(SSH)162
5.6 Recommended Reading and Web Sites173
5.7 Key Terms,Review Questions,and Problems173
Chapter 6 Wireless Network Security175
6.1 IEEE 802.11 Wireless LAN Overview177
6.2 IEEE 802.11i Wireless LAN Security183
6.3 Wireless Application Protocol Overview197
6.4 Wireless Transport Layer Security204
6.5 WAP End-to-End Security214
6.6 Recommended Reading and Web Sites217
6.7 Key Terms,Review Questions,and Problems218
Chapter 7 Electronic Mail Security221
7.1 Pretty Good Privacy222
7.2 S/MIME241
7.3 DomainKeys Identified Mail257
7.4 Recommended Reading and Web Sites264
7.5 Key Terms,Review Questions,and Problems265
Appendix 7A Radix-64 Conversion266
Chapter 8 IP Security269
8.1 IP Security Overview270
8.2 IP Security Policy276
8.3 Encapsulating Security Payload281
8.4 Combining Security Associations288
8.5 Internet Key Exchange292
8.6 Cryptographic Suites301
8.7 Recommended Reading and Web Sites302
8.8 Key Terms,Review Questions,and Problems303
PART THREE SYSTEM SECURITY305
Chapter 9 Intruders305
9.1 Intruders307
9.2 Intrusion Detection312
9.3 Password Management323
9.4 Recommended Reading and Web Sites333
9.5 Key Terms,Review Questions,and Problems334
Appendix 9A The Base-Rate Fallacy337
Chapter 10 Malicious Software340
10.1 Types of Malicious Software341
10.2 Viruses346
10.3 Virus Countermeasures351
10.4 Worms356
10.5 Distributed Denial of Service Attacks365
10.6 Recommended Reading and Web Sites370
10.7 Key Terms,Review Questions,and Problems371
Chapter 11 Firewalls374
11.1 The Need for Firewalls375
11.2 Firewall Characteristics376
11.3 Types of Firewalls378
11.4 Firewall Basing385
11.5 Firewall Location and Configurations388
11.6 Recommended Reading and Web Site393
11.7 Key Terms,Review Questions,and Problems394
APPENDICES398
Appendix A Some Aspects of Number Theory398
A.1 Prime and Relatively Prime Numbers399
A.2 Modular Arithmetic401
Appendix B Projects for Teaching Network Security403
B.1 Research Projects404
B.2 Hacking Project405
B.3 Programming Projects405
B.4 Laboratory Exercises406
B.5 Practical Security Assessments406
B.6 Writing Assignments406
B.7 Reading/Report Assignments407
Index408
ONLINE CHAPTERS3
Chapter 12 Network Management Security12.1 Basic Concepts of SNMP12.2 SNMPv1 Community Facility12.3 SNMPv3
12.4 Recommended Reading and Web Sites12.5 Key Terms,Review Questions,and ProblemsChapter 13 Legal and Ethical Aspects13.1 Cybercrime and Computer Crime13.2 Intellectual Property13.3 Privacy13.4 Ethical Issues13.5 Recommended Reading and Web Sites13.6 Key Terms,Review Questions,and ProblemsONLENE APPENDICESAppendix C Standards and Standards-Setting OrganizationsC.1 The Importance of StandardsC.2 Internet Standards and the Internet SocietyC.3 National Institute of Standards and TechnologyAppendix D TCP/IP and OSID.1 Protocols and Protocol ArchitecturesD.2 The TCP/IP Protocol ArchitectureD.3 The Role of an Internet ProtocolD.4 IPv4
D.5 IPv6
热门推荐
- 2240544.html
- 3359516.html
- 2420963.html
- 2050488.html
- 3194646.html
- 2496172.html
- 3833167.html
- 1408405.html
- 1059573.html
- 3435555.html
- http://www.ickdjs.cc/book_1597440.html
- http://www.ickdjs.cc/book_3727930.html
- http://www.ickdjs.cc/book_82062.html
- http://www.ickdjs.cc/book_2610758.html
- http://www.ickdjs.cc/book_2633236.html
- http://www.ickdjs.cc/book_1963312.html
- http://www.ickdjs.cc/book_1422703.html
- http://www.ickdjs.cc/book_1322970.html
- http://www.ickdjs.cc/book_250604.html
- http://www.ickdjs.cc/book_252008.html