返回首页
苏宁会员
购物车 0
易付宝
手机苏宁

服务体验

店铺评分与同行业相比

用户评价:----

物流时效:----

售后服务:----

  • 服务承诺: 正品保障
  • 公司名称:
  • 所 在 地:
本店所有商品

  • 全新正版网络安全基础:应用与标准9787302519768清华大学出版社
    • 作者: (美)威廉·斯托林斯(William Stallings)著著 | (美)威廉·斯托林斯(William Stallings)著编 | (美)威廉·斯托林斯(William Stallings)著译 | (美)威廉·斯托林斯(William Stallings)著绘
    • 出版社: 清华大学出版社
    • 出版时间:2018-07-01
    送至
  • 由""直接销售和发货,并提供售后服务
  • 加入购物车 购买电子书
    服务

    看了又看

    商品预定流程:

    查看大图
    /
    ×

    苏宁商家

    商家:
    如梦图书专营店
    联系:
    • 商品

    • 服务

    • 物流

    搜索店内商品

    商品参数
    • 作者: (美)威廉·斯托林斯(William Stallings)著著| (美)威廉·斯托林斯(William Stallings)著编| (美)威廉·斯托林斯(William Stallings)著译| (美)威廉·斯托林斯(William Stallings)著绘
    • 出版社:清华大学出版社
    • 出版时间:2018-07-01
    • 版次:1
    • 印刷时间:2019-04-01
    • 字数:550000
    • 页数:13423
    • 开本:大32开
    • ISBN:9787302519768
    • 版权提供:清华大学出版社
    • 作者:(美)威廉·斯托林斯(William Stallings)著
    • 著:(美)威廉·斯托林斯(William Stallings)著
    • 装帧:平装
    • 印次:暂无
    • 定价:89.00
    • ISBN:9787302519768
    • 出版社:清华大学出版社
    • 开本:大32开
    • 印刷时间:2019-04-01
    • 语种:英语
    • 出版时间:2018-07-01
    • 页数:13423
    • 外部编号:9504999
    • 版次:1
    • 成品尺寸:暂无

    Preface 7
    About the Authr 3
    Chapter 1 Introduction 1

    Computer Security Concepts 4
    The OSI Security Architecture 8
    Security Attacks 9
    Security Services 11
    Security Mechanisms 15
    A Model for Network Security 16
    Standards 19
    Outline of This Book 19
    Recommended Reading 20
    Internet and Web Resources 20
    Key Terms, Review estions, and Problems 21
    PART ONE CRyPTOgRAPhy
    Chapter 2 Symmetric Encryption and Message Confidentiality

    Symmetric Encryption Principles 25
    Symmetric Block Encryption Algorithms 30
    Random and Pseudorandom Numbers 36
    Stream Ciphers and RC4 41
    Cipher Block Modes of Oraio 46
    Recommended Reading 51
    Key Terms, Review estions, and Problems 52
    Chapter 3 Public-Key Cryptography and Message Authentication 57
    Approaches to Message Authentication 59
    Secure Hash Functions 63
    Message Authentication Codes 70
    Public-Key Cryptography Principles 76
    Public-Key Cryptography Algorithms 79
    Digital Signatures 87
    Recommended Reading 88
    Key Terms, Review estions, and Problems 88
    PART TWO NETWORk SECuRiTy APPliCATiONS 95
    Chapter 4 Key Distribution and User Authentication 95
    Symmetric Key Distribution Using Symmetric Encryption 96
    Kerberos 98
    Key Distribution Using Asymmetric Encryption 111
    X.509 Certificates 113
    Public-Key Infrastructure 121
    Federated Identity Management 1
    Recommended Reading 129
    Key Terms, Review estions, and Problems 130
    Chapter 5 Network Access Control and Cloud Security 135
    Network Access Contrl 36
    Extensible Authentication Protocl 39
    IEEE 802.1X Port-Based Network Access Contrl 43
    Cloud Computing 145
    Cloud Security Risks and Countermeasures 152
    Data Protection in the Cloud 154
    Cloud Security as a Service 157
    Recommended Reading 160
    Key Terms, Review estions, and Problems 161
    Chapter 6 Transport-Level Security 162
    Web Security Considerations 163
    Secure Sockets Layer (SSL) 165
    Transport Layer Security (TLS) 179
    HTTPS 183
    Secure Shell (SSH) 184
    Recommended Reading 195
    Key Terms, Review estions, and Problems 196
    Chapter 7 Wireless Network Security 198
    Wireless Security 199
    Mobile Device Security 202
    IEEE 802.11 Wireless LAN Overview 206
    IEEE 802.11i Wireless LAN Security 212
    Recommended Reading 226
    Key Terms, Review estions, and Problems 227
    Chapter 8 Electronic Mail Security 0
    Pretty Good Privacy (PGP) 1
    S/MIME
    DomainKeys Identified Mail (DKIM) 255
    Recommended Reading 262
    Key Terms, Review estions, and Problems 262
    Chapter 9 IP Security 264
    IP Security Overview 266
    IP Security Policy 270
    Encapsulating Security Payload 276
    Combining Security Associations 283
    Internet Key Exchange 287
    Cryptographic Suites 295
    Recommended Reading 297
    Key Terms, Review estions, and Problems 297
    Contents 5
    PART ThREE SySTEm SECuRiTy 299
    Chapter 10 Malicious Software 299
    Types of Malicious Software (Malware) 300
    Propagation—Infected Content—Viruses 303
    Propagation—Vulnerability Exploit—Worms 308
    Propagation—Social Engineering—SPAM E-mail, Trojans 313
    Payload—System Corruption 315
    Payload—Attack Agent—Zombie, Bots 316
    Payload—Information Theft—Keyloggers, Phishing, Spyware 318
    Payload—Stealthing—Backdoors, Rootkits 319
    Countermeasures 321
    Distributed Denial of Service Attacks 327
    Recommended Reading 332
    Key Terms, Review estions, and Problems 333
    Chapter 11 Intruders 336
    Intruders 338
    Intrusion Detection 342
    Password Management 357
    Recommended Reading 368
    Key Terms, Review estions, and Problems 369
    Chapter 12 Firewalls 373
    The Need for Firewalls 374
    Firewall Characteristics 375
    Types of Firewalls 377
    Firewall Basing 383
    Firewall Location and Configurations 386
    Recommended Reading 391
    Key Terms, Review estions, and Problems 391
    APPENDICES 395
    Appendix A Some Aspects of Number Theory 395
    Prime and Relatively Prime Numbers 396
    Modular Arithmetic 398
    Appendix B Projects for Teaching Network Security 400
    Research Projects 401
    Hacking Project 402
    Programming Projects 402
    Laboratory Exercises 403
    Practical Security Assessments 403
    Firewall Projects 403
    Case Studies 404
    Writing Assignments 404
    Reading/Report Assignments 404
    References 405
    Index 412

    本书是网络安全方面的一本入门书籍,系统地介绍了网络安全的基础知识,包括构成网络安全原理所的密码学知识、网络安全原理和主要的工业标准与应用。全书分为三大部分。*部分为密码学,主要介绍对称加密方法、公钥密码学原理和消息认方法;第二部分为网络安全应用,主要介绍网络安全解决方案中的密钥分配、用户认网络访问控制、云安全、传输层安全、无线网络安全、邮件安全和IP层安全等方面的重要协议或工业标准;第三部分为系统安全,主要介绍互联网系统中的恶意软件、入侵者和防火墙等方面内容。

    本书适合作为生或网络安全课程的教材,也可作为从事计算机、通信和工程等领域的科技人员理解网络安全基本原理的参考用书。 

    售后保障

    最近浏览

    猜你喜欢

    该商品在当前城市正在进行 促销

    注:参加抢购将不再享受其他优惠活动

    x
    您已成功将商品加入收藏夹

    查看我的收藏夹

    确定

    非常抱歉,您前期未参加预订活动,
    无法支付尾款哦!

    关闭

    抱歉,您暂无任性付资格

    此时为正式期SUPER会员专享抢购期,普通会员暂不可抢购