內容大鋼
本書由著名作者William Stallings編寫,是網路安全領域最重要、影響最廣泛的教材。
本書是網路安全方面的一本入門書籍,系統地介紹了網路安全的基礎知識,包括構成網路安全原理所必需的密碼學知識、網路安全原理和主要的工業標準與應用。全書分為三大部分。第一部分為密碼學,主要介紹對稱加密方法、公鑰密碼學原理和消息認證方法;第二部分為網路安全應用,主要介紹網路安全解決方案中的密鑰分配、用戶認證、網路訪問控制、雲安全、傳輸層安全、無線網路安全、電子郵件安全和IP層安全等方面的重要協議或工業標準:第三部分為系統安全,主要介紹互聯網系統中的惡意軟體、入侵者和防火牆等方面內容。
本書適合作為本科生或研究生網路安全課程的教材,也可作為從事電腦、通信和電子工程等領域的科技人員理解網路安全基本原理的參考用書。
目錄
Preface
About the Author
Chapter 1 Introduction
1.1 Computer Security Concepts
1.2 The OSI Security Architecture
1.3 Security Attacks
1.4 Security Services
1.5 Security Mechanisms
1.6 A Model for Network Security
1.7 Standards
1.8 Outline of This Book
1.9 Recommended Reading
1.10 Internet and Web Resources
1.11 Key Terms, Review Questions, and Problems
PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality
2.1 Symmetric Encryption Principles
2.2 Symmetric Block Encryption Algorithms
2.3 Random and Pseudorandom Numbers
2.4 Stream Ciphers and RC4
2.5 Cipher Block Modes of Operation
2.6 Recommended Reading
2.7 Key Terms, Review Questions, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication
3.2 Secure Hash Functions
3.3 Message Authentication Codes
3.4 Pubhc-Key Cryptography Principles
3.5 Public-Key Cryptography Algorithms
3.6 Digital Signatures
3.7 Recommended Reading
3.8 Key Terms, Review Questions, and Problems
PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Key Distribution and User Authentication
4.1 Symmetric Key Distribution Using Symmetric Encryption
4.2 Kerberos
4.3 Key Distribution Using Asymmetric Encryption
4.4 X.50 9 Certificates
4.5 Public-Key Infrastructure
4.6 Federated Identity Management
4.7 Recommended Reading
4.8 Key Terms, Review Questions, and Problems
Chapter 5 Network Access Control and Cloud Security
5.1 Network Access Control
5.2 Extensible Authentication Protocol
5.3 IEEE 802.1 X Port-Based Network Access Control
5.4 Cloud Computing
5.5 Cloud Security Risks and Countermeasures
5.6 Data Protection in the Cloud
5.7 Cloud Security as a Service
5.8 Recommended Reading
5.9 Key Terms, Review Questions, and Problems
Chapter 6 Transport-Level Security
6.1 Web Security Considerations
6.2 Secure Sockets Layer (SSL)
6.3 Transport Layer Security (TLS)
6.4 HTTPS
6.5 Secure Shell (SSH)
6.6 Recommended Reading
6.7 Key Terms, Review Questions, and Problems
Chapter 7 Wireless Network Security
7.1 Wireless Security
7.2 Mobile Device Security
7.3 IEEE 802.11 Wireless LAN Overview
7.4 IEEE 802.11 i Wireless LAN Security
7.5 Recommended Reading
7.6 Key Terms, Review Questions, and Problems
Chapter 8 Electronic Mail Security
8.1 Pretty Good Privacy (PGP)
8.2 S/MIME
8.3 DomainKeys Identified Mail (DKIM)
8.4 Recommended Reading
8.5 Key Terms, Review Questions, and Problems
Chapter 9 IP Security
9.1 IP Security Overview
9.2 IP Security Policy
9.3 Encapsulating Security Payload
9.4 Combining Security Associations
9.5 Internet Key Exchange
9.6 Cryptographic Suites
9.7 Recommended Reading
9.8 Key Terms, Review Questions, and Problems
PART THREE SYSTEM SECURITY
Chapter 10 Malicious Software
10.1 Types of Malicious Software (Malware)
10.2 Propagation--Infected Content--Viruses
10.3 Propagation--Vulnerability Exploit--Worms
10.4 Propagation--Social Engineering--SPAM E-mail, Trojans
10.5 Payload--System Corruption
10.6 Payload--Attack Agent--Zombie, Bots
10.7 Payload--Information Theft--Keyloggers, Phishing, Spyware
10.8 Payload--Stealthing--Backdoors, Rootkits
10.9 Countermeasures
10.10 Distributed Denial of Service Attacks
10.11 Recommended Reading
10.12 Key Terms, Review Questions, and Problems
Chapter 11 Intruders
11.1 Intruders
11.2 Intrusion Detection
11.3 Password Management
11.4 Recommended Reading
11.5 Key Terms, Review Questions, and Problems
Chapter 12 Firewalls
12.1 The Need for Firewalls
12.2 Firewall Characteristics
12.3 Types of Firewalls
12.4 Firewall Basing
12.5 Firewall Location and Configurations
12.6 Recommended Reading
12.7 Key Terms, Review Questions, and Problems
APPENDICES
Appendix A Some Aspects of Number Theory
A.1 Prime and Relatively Prime Numbers
A.2 Modular Arithmetic
Appendix B Projects for Teaching Network Security
B.1 Research Projects
B.2 Hacking Project
B.3 Programming Projects
B.4 Laboratory Exercises
B.5 Practical Security Assessments
B.6 Firewall Projects
B.7 Case Studies
B.8 Writing Assignments
B.9 Reading/Report Assignments
References
Index