幫助中心 | 我的帳號 | 關於我們

網路安全基礎(應用與標準第5版影印版)/大學電腦教育國外著名教材系列

  • 作者:(美)威廉·斯托林斯
  • 出版社:清華大學
  • ISBN:9787302519768
  • 出版日期:2019/05/01
  • 裝幀:平裝
  • 頁數:423
人民幣:RMB 89 元      售價:NT$ 400.5
放入購物車
加入收藏夾

內容大鋼
    本書由著名作者William Stallings編寫,是網路安全領域最重要、影響最廣泛的教材。
    本書是網路安全方面的一本入門書籍,系統地介紹了網路安全的基礎知識,包括構成網路安全原理所必需的密碼學知識、網路安全原理和主要的工業標準與應用。全書分為三大部分。第一部分為密碼學,主要介紹對稱加密方法、公鑰密碼學原理和消息認證方法;第二部分為網路安全應用,主要介紹網路安全解決方案中的密鑰分配、用戶認證、網路訪問控制、雲安全、傳輸層安全、無線網路安全、電子郵件安全和IP層安全等方面的重要協議或工業標準:第三部分為系統安全,主要介紹互聯網系統中的惡意軟體、入侵者和防火牆等方面內容。
    本書適合作為本科生或研究生網路安全課程的教材,也可作為從事電腦、通信和電子工程等領域的科技人員理解網路安全基本原理的參考用書。

作者介紹
(美)威廉·斯托林斯

目錄
Preface
About the Author
Chapter 1 Introduction
  1.1  Computer Security Concepts
  1.2  The OSI Security Architecture
  1.3  Security Attacks
  1.4  Security Services
  1.5  Security Mechanisms
  1.6  A Model for Network Security
  1.7  Standards
  1.8  Outline of This Book
  1.9  Recommended Reading
  1.10  Internet and Web Resources
  1.11  Key Terms, Review Questions, and Problems
PART ONE CRYPTOGRAPHY
Chapter 2 Symmetric Encryption and Message Confidentiality
  2.1  Symmetric Encryption Principles
  2.2  Symmetric Block Encryption Algorithms
  2.3  Random and Pseudorandom Numbers
  2.4  Stream Ciphers and RC4
  2.5  Cipher Block Modes of Operation
  2.6  Recommended Reading
  2.7  Key Terms, Review Questions, and Problems
Chapter 3 Public-Key Cryptography and Message Authentication
  3.1  Approaches to Message Authentication
  3.2  Secure Hash Functions
  3.3  Message Authentication Codes
  3.4  Pubhc-Key Cryptography Principles
  3.5  Public-Key Cryptography Algorithms
  3.6  Digital Signatures
  3.7  Recommended Reading
  3.8  Key Terms, Review Questions, and Problems
PART TWO NETWORK SECURITY APPLICATIONS
Chapter 4 Key Distribution and User Authentication
  4.1  Symmetric Key Distribution Using Symmetric Encryption
  4.2  Kerberos
  4.3  Key Distribution Using Asymmetric Encryption
    4.4 X.50  9 Certificates
  4.5  Public-Key Infrastructure
  4.6  Federated Identity Management
  4.7  Recommended Reading
  4.8  Key Terms, Review Questions, and Problems
Chapter 5 Network Access Control and Cloud Security
  5.1  Network Access Control
  5.2  Extensible Authentication Protocol
    5.3 IEEE 802.1  X Port-Based Network Access Control
  5.4  Cloud Computing
  5.5  Cloud Security Risks and Countermeasures
  5.6  Data Protection in the Cloud
  5.7  Cloud Security as a Service

  5.8  Recommended Reading
  5.9  Key Terms, Review Questions, and Problems
Chapter 6 Transport-Level Security
  6.1  Web Security Considerations
  6.2  Secure Sockets Layer (SSL)
  6.3  Transport Layer Security (TLS)
  6.4  HTTPS
  6.5  Secure Shell (SSH)
  6.6  Recommended Reading
  6.7  Key Terms, Review Questions, and Problems
Chapter 7 Wireless Network Security
  7.1  Wireless Security
  7.2  Mobile Device Security
    7.3 IEEE 802.11  Wireless LAN Overview
    7.4 IEEE 802.11  i Wireless LAN Security
  7.5  Recommended Reading
  7.6  Key Terms, Review Questions, and Problems
Chapter 8 Electronic Mail Security
  8.1  Pretty Good Privacy (PGP)
  8.2  S/MIME
  8.3  DomainKeys Identified Mail (DKIM)
  8.4  Recommended Reading
  8.5  Key Terms, Review Questions, and Problems
Chapter 9 IP Security
  9.1  IP Security Overview
  9.2  IP Security Policy
  9.3  Encapsulating Security Payload
  9.4  Combining Security Associations
  9.5  Internet Key Exchange
  9.6  Cryptographic Suites
  9.7  Recommended Reading
  9.8  Key Terms, Review Questions, and Problems
PART THREE SYSTEM SECURITY
Chapter 10 Malicious Software
  10.1  Types of Malicious Software (Malware)
  10.2  Propagation--Infected Content--Viruses
  10.3  Propagation--Vulnerability Exploit--Worms
  10.4  Propagation--Social Engineering--SPAM E-mail, Trojans
  10.5  Payload--System Corruption
  10.6  Payload--Attack Agent--Zombie, Bots
  10.7  Payload--Information Theft--Keyloggers, Phishing, Spyware
  10.8  Payload--Stealthing--Backdoors, Rootkits
  10.9  Countermeasures
  10.10  Distributed Denial of Service Attacks
  10.11  Recommended Reading
  10.12  Key Terms, Review Questions, and Problems
Chapter 11 Intruders
  11.1  Intruders
  11.2  Intrusion Detection
  11.3  Password Management

  11.4  Recommended Reading
  11.5  Key Terms, Review Questions, and Problems
Chapter 12 Firewalls
  12.1  The Need for Firewalls
  12.2  Firewall Characteristics
  12.3  Types of Firewalls
  12.4  Firewall Basing
  12.5  Firewall Location and Configurations
  12.6  Recommended Reading
  12.7  Key Terms, Review Questions, and Problems
APPENDICES
Appendix A Some Aspects of Number Theory
  A.1  Prime and Relatively Prime Numbers
  A.2  Modular Arithmetic
Appendix B Projects for Teaching Network Security
  B.1  Research Projects
  B.2  Hacking Project
  B.3  Programming Projects
  B.4  Laboratory Exercises
  B.5  Practical Security Assessments
  B.6  Firewall Projects
  B.7  Case Studies
  B.8  Writing Assignments
  B.9  Reading/Report Assignments
References
Index

  • 商品搜索:
  • | 高級搜索
首頁新手上路客服中心關於我們聯絡我們Top↑
Copyrightc 1999~2008 美商天龍國際圖書股份有限公司 臺灣分公司. All rights reserved.
營業地址:臺北市中正區重慶南路一段103號1F 105號1F-2F
讀者服務部電話:02-2381-2033 02-2381-1863 時間:週一-週五 10:00-17:00
 服務信箱:bookuu@69book.com 客戶、意見信箱:cs@69book.com
ICP證:浙B2-20060032