《计算机教育国外著名教材·教参系列·网络安全基础教程:应用与标准》[64M]百度网盘|pdf下载|亲测有效
《计算机教育国外著名教材·教参系列·网络安全基础教程:应用与标准》[64M]百度网盘|pdf下载|亲测有效

计算机教育国外著名教材·教参系列·网络安全基础教程:应用与标准 pdf下载

出版社 社会出版社
出版年 2002-06
页数 390页
装帧 精装
评分 8.6(豆瓣)
8.99¥ 10.99¥

内容简介

本篇主要提供计算机教育国外著名教材·教参系列·网络安全基础教程:应用与标准电子书的pdf版本下载,本电子书下载方式为百度网盘方式,点击以上按钮下单完成后即会通过邮件和网页的方式发货,有问题请联系邮箱ebook666@outlook.com

编辑推荐

  

  

内容简介

  本书较详细地介绍了网络安全的基础知识,应用及标准。在概述之后,主要介绍三部分内容:密码算法和协议,包括对称密码算法和公钥密码算法,以及哈希函数等内容。

  

精彩书评

  进入21世纪,世界各国的经济、科技以及综合国力的竞争将更加激烈。竞争的中心无疑是对人才的争夺。谁拥有大量高素质的人才,谁就能在竞争中取得优势。高等教育,作为培养高素质人才的事业,必然受到高度重视。目前我国高等教育的教材更新较慢,为了加快教材的更新频率,教育部正在大力促进我国高校采用国外原版教材。
  

目录

目 录
Preface,xi
CHAPTER1Introduction,
l.1Attacks,Services,andMechanisms
l.2SecurityAttacks.
l.3SecurityServices
l.4AModelforInternetworkSecurity
I.5InternetStandardsandRFCs
l.6RecommendedReading
AppendixIA:InternetandWebResources.
PARTONECRYPTOGRAPHY
CHAPTER2ConvendonalEncryptionandMessageConfidentiality

2.1ConventionalEncryptionPrinciples
2.2ConventionalEncryptionAlgorithms
2.3CipherBlockModesofOperation
2.4LocationofEncryptionDevices
2.5KeyDistribution.
2.6RecommendedReading.
2.7Problems
CHAPTER3Public-KeyCryptographyandkressageAuthenticadon

3.IApproachestoMessageAuthentication
3.2SecureHashFunctionsandHMAC
3.3PublicKeyCryptography
3.4Public-KeyCryptography
3.5DigitalSignatures
3.6KeyManagement
3.7RecommendedReading
3.8Problems
Appendix3A:PrimeNumbersandModularArithmetic
PARTTWONETWORRSECURITYAPPLICATIONS
CHAPTER4AuthenticationApplications

4.lKerberos
4.2X.509DirectoryAuthenticationService
4.3RecommendedReadingandWebSites
4.4Problems
Appendix4A:KerberosEncryptionTechniques
CHAPTER5ElectronicMailSecurity

5.lPrettyGoodPrivacy(PGP)
5.2S/MIME
5.3RecommendedWebSites
5.4Problems
Appendix5A:DataCompresslonUsingZIP
Appendix5B:Radix-64Conversion
Appendix5C:PGPRandomNumberGeneration
CHAPTSR6IPSecurity

6.lIPSecurityOverview
6.2IPSecurityArchitecture
6.3AuthenticationHeader
6.4EncapsulatingSecurityPayload
6.5CombiningSecurityAssociations
6.6KeyManagement
6.7RecommendedReadingandWebSites
6.8Problems
Appendix6A:InternetworkingandInternetProtocols
CHAPTER7WebSecurity

7.lWebSecurityRequirements
7.2SecureSocketsLayer(SSL)andTransportLayerSecurity(TLS)
7.3SecureElectronicTransaction(SET)
7.4RecommendedReadingandWebSites
7.5Problems
CHAPTER8NetworkManagementSecnrity

8.lBasicConceptsofSNMP
8.2SNMPvlCommunityFacility
8.3SNMPv3
8.4RecommendedReadingandWebSites
8.5Problems
PARTTHREESYSTEMSECURITY
CHAPTER9IntrudersandViruses

9.lIntruders
9.2VirusesandRelatedThreats
9.3RecommendedReadingandWebSites.
9.4Problems
CHAPTER1OFirewalls

IO.lFirewallDesignPrinciples
IO.2TrustedSystems
IO.3RecommendedReading
IO.4Problems
APPENDDCARFCsCitedinthisBook.
APPENDDCBProjectsforTeachingNetvvorkSecurity
B.lResearchProjects.
B.2ProgrammingProjects
B.3Reading/ReportAssignments
GLOSSARY
REPERENCES
INDEX