大学计算机教育国外有名教材系列影印版网络安全基础:应用与标准(第5版)/(美)威廉.斯托林斯
本书特色
[
本书是网络安全方面的一本入门书籍,系统地介绍了网络安全的基础知识,包括构成网络安全原理所必需的密码学知识、网络安全原理和主要的工业标准与应用。全书分为三大部分。*部分为密码学,主要介绍对称加密方法、公钥密码学原理和消息认证方法;第二部分为网络安全应用,主要介绍网络安全解决方案中的密钥分配、用户认证、网络访问控制、云安全、传输层安全、无线网络安全、电子邮件安全和IP层安全等方面的重要协议或工业标准;第三部分为系统安全,主要介绍互联网系统中的恶意软件、入侵者和防火墙等方面内容。
]
内容简介
[
本书是网络安全方面的一本入门书籍,系统地介绍了网络安全的基础知识,包括构成网络安全原理所必需的密码学知识、网络安全原理和主要的工业标准与应用。全书分为三大部分。部分为密码学,主要介绍对称加密方法、公钥密码学原理和消息认证方法;第二部分为网络安全应用,主要介绍网络安全解决方案中的密钥分配、用户认证、网络访问控制、云安全、传输层安全、无线网络安全、电子邮件安全和IP层安全等方面的重要协议或工业标准;第三部分为系统安全,主要介绍互联网系统中的恶意软件、入侵者和防火墙等方面内容。
]
目录
Preface 7About the Author 13Chapter 1 Introduction 1Computer Security Concepts 4The OSI Security Architecture 8Security Attacks 9Security Services 11Security Mechanisms 15A Model for Network Security 16Standards 19Outline of This Book 19Recommended Reading 20Internet and Web Resources 20Key Terms, Review Questions, and Problems 21PART ONE CRyPTOgRAPhy 23Chapter 2 Symmetric Encryption and Message Confidentiality 23Symmetric Encryption Principles 25Symmetric Block Encryption Algorithms 30Random and Pseudorandom Numbers 36Stream Ciphers and RC4 41Cipher Block Modes of Operation 46Recommended Reading 51Key Terms, Review Questions, and Problems 52Chapter 3 Public-Key Cryptography and Message Authentication 57Approaches to Message Authentication 59Secure Hash Functions 63Message Authentication Codes 70Public-Key Cryptography Principles 76Public-Key Cryptography Algorithms 79Digital Signatures 87Recommended Reading 88Key Terms, Review Questions, and Problems 88PART TWO NETWORk SECuRiTy APPliCATiONS 95Chapter 4 Key Distribution and User Authentication 95Symmetric Key Distribution Using Symmetric Encryption 96Kerberos 98Key Distribution Using Asymmetric Encryption 111X.509 Certificates 113Public-Key Infrastructure 121Federated Identity Management 123Recommended Reading 129Key Terms, Review Questions, and Problems 130Chapter 5 Network Access Control and Cloud Security 135Network Access Control 136Extensible Authentication Protocol 139IEEE 802.1X Port-Based Network Access Control 143Cloud Computing 145Cloud Security Risks and Countermeasures 152Data Protection in the Cloud 154Cloud Security as a Service 157Recommended Reading 160Key Terms, Review Questions, and Problems 161Chapter 6 Transport-Level Security 162Web Security Considerations 163Secure Sockets Layer (SSL) 165Transport Layer Security (TLS) 179HTTPS 183Secure Shell (SSH) 184Recommended Reading 195Key Terms, Review Questions, and Problems 196Chapter 7 Wireless Network Security 198Wireless Security 199Mobile Device Security 202IEEE 802.11 Wireless LAN Overview 206IEEE 802.11i Wireless LAN Security 212Recommended Reading 226Key Terms, Review Questions, and Problems 227Chapter 8 Electronic Mail Security 230Pretty Good Privacy (PGP) 231S/MIME 239DomainKeys Identified Mail (DKIM) 255Recommended Reading 262Key Terms, Review Questions, and Problems 262Chapter 9 IP Security 264IP Security Overview 266IP Security Policy 270Encapsulating Security Payload 276Combining Security Associations 283Internet Key Exchange 287Cryptographic Suites 295Recommended Reading 297Key Terms, Review Questions, and Problems 297Contents 5PART ThREE SySTEm SECuRiTy 299Chapter 10 Malicious Software 299Types of Malicious Software (Malware) 300Propagation—Infected Content—Viruses 303Propagation—Vulnerability Exploit—Worms 308Propagation—Social Engineering—SPAM E-mail, Trojans 313Payload—System Corruption 315Payload—Attack Agent—Zombie, Bots 316Payload—Information Theft—Keyloggers, Phishing, Spyware 318Payload—Stealthing—Backdoors, Rootkits 319Countermeasures 321Distributed Denial of Service Attacks 327Recommended Reading 332Key Terms, Review Questions, and Problems 333Chapter 11 Intruders 336Intruders 338Intrusion Detection 342Password Management 357Recommended Reading 368Key Terms, Review Questions, and Problems 369Chapter 12 Firewalls 373The Need for Firewalls 374Firewall Characteristics 375Types of Firewalls 377Firewall Basing 383Firewall Location and Configurations 386Recommended Reading 391Key Terms, Review Questions, and Problems 391APPENDICES 395Appendix A Some Aspects of Number Theory 395Prime and Relatively Prime Numbers 396Modular Arithmetic 398Appendix B Projects for Teaching Network Security 400Research Projects 401Hacking Project 402Programming Projects 402Laboratory Exercises 403Practical Security Assessments 403Firewall Projects 403Case Studies 404Writing Assignments 404Reading/Report Assignments 404References 405Index 412
封面
书名:大学计算机教育国外有名教材系列影印版网络安全基础:应用与标准(第5版)/(美)威廉.斯托林斯
作者:(美)威廉·斯托林斯(William S
页数:0
定价:¥89.0
出版社:清华大学出版社
出版日期:2019-05-01
ISBN:9787302519768
PDF电子书大小:39MB 高清扫描完整版
本文标题:《大学计算机教育国外有名教材系列影印版网络安全基础:应用与标准(第5版)/(美)威廉.斯托林斯》PDF下载
资源仅供学习参考,禁止用于商业用途,请在下载后24小时内删除!