出版社:清华大学出版社
年代:2007
定价:39.0
本书介绍当前网络安全解决方案中使用的主要算法,重要协议和系统管理方法等。
Preface Chapter 1 Introduction 1.1 Security Trends 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Internetwork Security 1.7 Internet Standards the Internet Society 1.8 Outline of This Book 1.9 Recommended Reading 1.10 Internet andWeb Resources 1.11 Key Terms, Review Questions, and ProblemsPART ONE CRYPTOGRAPHY Chapter 2 Symmetric Encryption and Message Confidentiality
Preface Chapter 1 Introduction 1.1 Security Trends 1.2 The OSI Security Architecture 1.3 Security Attacks 1.4 Security Services 1.5 Security Mechanisms 1.6 A Model for Internetwork Security 1.7 Internet Standards the Internet Society 1.8 Outline of This Book 1.9 Recommended Reading 1.10 Internet andWeb Resources 1.11 Key Terms, Review Questions, and ProblemsPART ONE CRYPTOGRAPHY Chapter 2 Symmetric Encryption and Message Confidentiality 2.1 Symmetric Encryption Principles 2.2 Symmetric Block Encryption Algorithms 2.3 Stream Ciphers and RC4 2.4 Cipher Block Modes of Operation 2.5 Location of Encryption Devices 2.6 Key Distribution 2.7 Recommended Reading andWeb Sites 2.8 Key Terms, Review Questions, and Problems Chapter 3 Public-Key Cryptography and Message Authentication 3.1 Approaches to Message Authentication 3.2 Secure Hash Functions and HMAC 3.3 Public Key Cryptography Principles 3.4 Public-Key Cryptography Algorithms 3.5 Digital Signatures 3.6 Key Management 3.7 Recommended Reading andWeb Sites 3.8 Key Terms, Review Questions, and ProblemsPART TWO NETWORK SECURITY APPLICATIONS Chapter 4 Authentication Applications 4.1 Kerberos 95 4.2 X.509 Directory Authentication Service 4.3 Public Key Infrastructure 4.4 Recommended Reading and Web Sites 4.4 Key Terms, Review Questions, and Problems Appendix 4A: Kerberos Encryption Techniques Chapter 5 Electronic Mail Security 5.1 Pretty Good Privacy (PGP) 5.2 S/MIME 5.3 Recommended Web Sites 5.4 Key Terms, Review Questions, and Problems Appendix 5A: Data Compression Using ZIP Appendix 5B: Radix-64 Conversion Appendix 5C: PGP Random Number Generation Chapter 6 IP Security 6.1 IP Security Overview 6.2 IP Security Architecture 6.3 Authentication Header 6.4 Encapsulating Security Payload 6.5 Combining Security Associations 6.6 Key Management 200 6.7 Recommended Reading andWeb Sites 6.8 Key Terms, Review Questions, and Problems Appendix 6A: Internetworking and Internet Protocols Chapter 7 Web Security 7.1 Web Security Requirements 7.2 Secure Sockets Layer (SSL) and Transport Layer Security (TLS) 7.3 Secure Electronic Transaction (SET) 7.4 Recommended Reading and Web Sites 7.5 Key Terms, Review Questions, and Problems Chapter 8 Network Management Security 8.1 Basic Concepts of SNMP 8.2 SNMPvl Community Facility 8.3 SNMPv3 269 8.4 Recommended Reading and Web Sites 8.5 Key Terms, Review Questions, and ProblemsPART THREE SYSTEM SECURITY Chapter 9 Intruders 9.1 Intruders 9.2 Intrusion Detection 9.3 Password Management 9.4 Recommended Reading and Web Sites 9.5 Key Terms, Review Questions, and Problems Appendix 9A:The Base-Rate Fallacy Chapter 10 Malicious Sofrware Chapter 11 FirewallsAPPENDICES AppendixA Some Aspects of Number THeory AppendixB Projects for Teaching Network SecurityGlossaryReferencesIndex
本书由著名作者William Stallings编写,完全从实用的角度出发,用较小的篇幅对当前网络安全解决方案中使用的主要算法、重要协议和系统管理方法等内容做了全面而详细的介绍。全书共分为三部分: (1)密码算法和协议,包括网络安全应用中最常用的密码算法和协议; (2)网络安全应用,介绍了网络安全解决方案中使用的各种安全协议,如Kerberos、PGP、S/MIME、IPSeC、SSI/TLS和SET等; (3)系统安全,介绍了一些系统级的安全问题,如网络入侵、恶意软件和防火墙等。每章后面都提供了一定数量的推荐读物、网址、思考题和习题等。全书最后还提供了一定数量的项目作业。为方便使用本教材的教师搞好教学,出版社还提供了较为完整的配套服务。与本书的前两版相比,第3版除在语言和叙述方面做进一步加工提高外,主要增加的内容包括RC4算法、公钥基础设施(PKI)、分布式拒绝服务攻击(DDos)和信息技术安全评估通用准则等。 本书既可作为我国高校相关课程的教材使用,又是满足普通网络安全爱好者学习和了解网络安全基本知识的一本难得好书。
书籍详细信息 | |||
书名 | 网络安全基础站内查询相似图书 | ||
9787302154518 如需购买下载《网络安全基础》pdf扫描版电子书或查询更多相关信息,请直接复制isbn,搜索即可全网搜索该ISBN | |||
出版地 | 北京 | 出版单位 | 清华大学出版社 |
版次 | 影印本 | 印次 | 1 |
定价(元) | 39.0 | 语种 | 英文 |
尺寸 | 26 | 装帧 | 平装 |
页数 | 430 | 印数 | 3000 |
网络安全基础是清华大学出版社于2007.出版的中图分类号为 TP393.08 的主题关于 计算机网络-安全技术-英文 的书籍。