大学计算机教育国外著名教材·教参系列·网络安全基础教程:应用与标准(影印版)

目 录内容简介
目 录
Preface,xi
CHAPTER1Introduction,
l.1Attacks,Services,andMechanisms
l.2SecurityAttacks.
l.3SecurityServices
l.4AModelforInternetworkSecurity
I.5InternetStandardsandRFCs
l.6RecommendedReading
AppendixIA:InternetandWebResources.
PARTONECRYPTOGRAPHY
CHAPTER2ConvendonalEncryptionandMessageConfidentiality
2.1ConventionalEncryptionPrinciples
2.2ConventionalEncryptionAlgorithms
2.3CipherBlockModesofOperation
2.4LocationofEncryptionDevices
2.5KeyDistribution.
2.6RecommendedReading.
2.7Problems
CHAPTER3Public-KeyCryptographyandkressageAuthenticadon
3.IApproachestoMessageAuthentication
3.2SecureHashFunctionsandHMAC
3.3PublicKeyCryptography
3.4Public-KeyCryptography
3.5DigitalSignatures
3.6KeyManagement
3.7RecommendedReading
3.8Problems
Appendix3A:PrimeNumbersandModularArithmetic
PARTTWONETWORRSECURITYAPPLICATIONS
CHAPTER4AuthenticationApplications
4.lKerberos
4.2X.509DirectoryAuthenticationService
4.3RecommendedReadingandWebSites
4.4Problems
Appendix4A:KerberosEncryptionTechniques
CHAPTER5ElectronicMailSecurity
5.lPrettyGoodPrivacy(PGP)
5.2S/MIME
5.3RecommendedWebSites
5.4Problems
Appendix5A:DataCompresslonUsingZIP
Appendix5B:Radix-64Conversion
Appendix5C:PGPRandomNumberGeneration
CHAPTSR6IPSecurity
6.lIPSecurityOverview
6.2IPSecurityArchitecture
6.3AuthenticationHeader
6.4EncapsulatingSecurityPayload
6.5CombiningSecurityAssociations
6.6KeyManagement
6.7RecommendedReadingandWebSites
6.8Problems
Appendix6A:InternetworkingandInternetProtocols
CHAPTER7WebSecurity
7.lWebSecurityRequirements
7.2SecureSocketsLayer(SSL)andTransportLayerSecurity(TLS)
7.3SecureElectronicTransaction(SET)
7.4RecommendedReadingandWebSites
7.5Problems
CHAPTER8NetworkManagementSecnrity
8.lBasicConceptsofSNMP
8.2SNMPvlCommunityFacility
8.3SNMPv3
8.4RecommendedReadingandWebSites
8.5Problems
PARTTHREESYSTEMSECURITY
CHAPTER9IntrudersandViruses
9.lIntruders
9.2VirusesandRelatedThreats
9.3RecommendedReadingandWebSites.
9.4Problems
CHAPTER1OFirewalls
IO.lFirewallDesignPrinciples
IO.2TrustedSystems
IO.3RecommendedReading
IO.4Problems
APPENDDCARFCsCitedinthisBook.
APPENDDCBProjectsforTeachingNetvvorkSecurity
B.lResearchProjects.
B.2ProgrammingProjects
B.3Reading/ReportAssignments
GLOSSARY
REPERENCES
INDEX
Preface,xi
CHAPTER1Introduction,
l.1Attacks,Services,andMechanisms
l.2SecurityAttacks.
l.3SecurityServices
l.4AModelforInternetworkSecurity
I.5InternetStandardsandRFCs
l.6RecommendedReading
AppendixIA:InternetandWebResources.
PARTONECRYPTOGRAPHY
CHAPTER2ConvendonalEncryptionandMessageConfidentiality
2.1ConventionalEncryptionPrinciples
2.2ConventionalEncryptionAlgorithms
2.3CipherBlockModesofOperation
2.4LocationofEncryptionDevices
2.5KeyDistribution.
2.6RecommendedReading.
2.7Problems
CHAPTER3Public-KeyCryptographyandkressageAuthenticadon
3.IApproachestoMessageAuthentication
3.2SecureHashFunctionsandHMAC
3.3PublicKeyCryptography
3.4Public-KeyCryptography
3.5DigitalSignatures
3.6KeyManagement
3.7RecommendedReading
3.8Problems
Appendix3A:PrimeNumbersandModularArithmetic
PARTTWONETWORRSECURITYAPPLICATIONS
CHAPTER4AuthenticationApplications
4.lKerberos
4.2X.509DirectoryAuthenticationService
4.3RecommendedReadingandWebSites
4.4Problems
Appendix4A:KerberosEncryptionTechniques
CHAPTER5ElectronicMailSecurity
5.lPrettyGoodPrivacy(PGP)
5.2S/MIME
5.3RecommendedWebSites
5.4Problems
Appendix5A:DataCompresslonUsingZIP
Appendix5B:Radix-64Conversion
Appendix5C:PGPRandomNumberGeneration
CHAPTSR6IPSecurity
6.lIPSecurityOverview
6.2IPSecurityArchitecture
6.3AuthenticationHeader
6.4EncapsulatingSecurityPayload
6.5CombiningSecurityAssociations
6.6KeyManagement
6.7RecommendedReadingandWebSites
6.8Problems
Appendix6A:InternetworkingandInternetProtocols
CHAPTER7WebSecurity
7.lWebSecurityRequirements
7.2SecureSocketsLayer(SSL)andTransportLayerSecurity(TLS)
7.3SecureElectronicTransaction(SET)
7.4RecommendedReadingandWebSites
7.5Problems
CHAPTER8NetworkManagementSecnrity
8.lBasicConceptsofSNMP
8.2SNMPvlCommunityFacility
8.3SNMPv3
8.4RecommendedReadingandWebSites
8.5Problems
PARTTHREESYSTEMSECURITY
CHAPTER9IntrudersandViruses
9.lIntruders
9.2VirusesandRelatedThreats
9.3RecommendedReadingandWebSites.
9.4Problems
CHAPTER1OFirewalls
IO.lFirewallDesignPrinciples
IO.2TrustedSystems
IO.3RecommendedReading
IO.4Problems
APPENDDCARFCsCitedinthisBook.
APPENDDCBProjectsforTeachingNetvvorkSecurity
B.lResearchProjects.
B.2ProgrammingProjects
B.3Reading/ReportAssignments
GLOSSARY
REPERENCES
INDEX
目 录内容简介
本书较详细地介绍了网络安全的基础知识,应用及标准。在概述之后,主要介绍三部分内容:密码算法和协议,包括对称密码算法和公钥密码算法,以及哈希函数等内容。
比价列表
公众号、微信群

微信公众号

实时获取购书优惠