图书介绍

网络安全基础教程 应用与标准2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

网络安全基础教程 应用与标准
  • William Stallings著 著
  • 出版社: 北京:清华大学出版社
  • ISBN:730205536X
  • 出版时间:2002
  • 标注页数:366页
  • 文件大小:65MB
  • 文件页数:380页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

网络安全基础教程 应用与标准PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 Introduction1

1.1 Attacks,Services,and Mechanisms4

1.2 Security Attacks6

1.3 Security Services9

1.4 A Model for Internetwork Security11

1.5 Internet Standards and RFCs13

1.6 Recommended Reading16

Appendix 1A:Internet and Web Resources16

PART ONE CRYPTOGRAPHY19

CHAPTER 2 Conventional Encryption and Message Confidentiality21

2.1 Conventional Encryption Principles22

2.2 Conventional Encryption Algorithms28

2.3 Cipher Block Modes of Operation37

2.4 Location of Encryption Devices39

2.5 Key Distribution42

2.6 Recommended Reading44

2.7 Problems44

CHAPTER 3 Public-Key Cryptography and Message Authentication47

3.1 Approaches to Message Authentication48

3.2 Secure Hash Functions and HMAC52

3.3 Public Key Cryptography Principles62

3.4 Public-Key Cryptography Algorithms66

3.5 Digital Signatures72

3.6 Key Management73

3.7 Recommended Reading75

3.8 Problems75

Appendix 3A:Prime Numbers and Modular Arithmetic77

PART TWO NETWORK SECURITY APPLICATIONS81

CHAPTER 4 Authentication Applications83

4.1 Kerberos84

4.2 X.509 Directory Authentication Service101

4.3 Recommended Reading and Web Sites110

4.4 Problems110

Appendix 4A:Kerberos Encryption Techniques111

CHAPTER 5 Electronic Mail Security117

5.1 Pretty Good Privacy(PGP)118

5.2 S/MIME136

5.3 Recommended Web Sites152

5.4 Problems152

Appendix 5A:Data Compression Using ZIP153

Appendix 5B:Radix-64 Conversion155

Appendix 5C:PGP Random Number Generation157

CHAPTER 6 IP Security161

6.1 IP Security Overview162

6.2 IP Security Architecture165

6.3 Authentication Header171

6.4 Encapsulating Security Payload176

6.5 Combining Security Associations181

6.6 Key Management184

6.7 Recommended Reading and Web Sites193

Appendix 6A:Internetworking and Internet Protocols194

6.8 Problems194

CHAPTER 7 Web Security203

7.1 Web Security Requirements204

7.2 Secure Sockets Layer(SSL)and Transport Layer Security(TLS)206

7.3 Secure Electronic Transaction(SET)223

7.4 Recommended Reading and Web Sites235

7.5 Problems235

CHAPTER 8 Network Management Security237

8.1 Basic Concepts of SNMP238

8.2 SNMPv1 Community Facility246

8.3 SNMPv3248

8.4 Recommended Reading and Web Sites273

8.5 Problems274

PART THREE SYSTEM SECURITY277

CHAPTER 9 Intruders and Viruses279

9.1 Intruders280

9.2 Viruses and Related Threats303

9.3 Recommended Reading and Web Sites316

9.4 Problems317

CHAPTER 10 Firewalls319

10.1 Firewall Design Principles320

10.2 Trusted Systems330

10.3 Recommended Reading336

10.4 Problems336

APPENDIX A RFCs Cited in this Book337

APPENDIX B Projects for Teaching Network Security339

B.1 Research Projects339

B.2 Programming Projects340

B.3 Reading/Report Assignments340

GLOSSARY341

REFERENCES347

INDEX353

热门推荐