图书介绍
网络安全基础教程 应用与标准2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- William Stallings著 著
- 出版社: 北京:清华大学出版社
- ISBN:730205536X
- 出版时间:2002
- 标注页数:366页
- 文件大小:65MB
- 文件页数:380页
- 主题词:
PDF下载
下载说明
网络安全基础教程 应用与标准PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
CHAPTER 1 Introduction1
1.1 Attacks,Services,and Mechanisms4
1.2 Security Attacks6
1.3 Security Services9
1.4 A Model for Internetwork Security11
1.5 Internet Standards and RFCs13
1.6 Recommended Reading16
Appendix 1A:Internet and Web Resources16
PART ONE CRYPTOGRAPHY19
CHAPTER 2 Conventional Encryption and Message Confidentiality21
2.1 Conventional Encryption Principles22
2.2 Conventional Encryption Algorithms28
2.3 Cipher Block Modes of Operation37
2.4 Location of Encryption Devices39
2.5 Key Distribution42
2.6 Recommended Reading44
2.7 Problems44
CHAPTER 3 Public-Key Cryptography and Message Authentication47
3.1 Approaches to Message Authentication48
3.2 Secure Hash Functions and HMAC52
3.3 Public Key Cryptography Principles62
3.4 Public-Key Cryptography Algorithms66
3.5 Digital Signatures72
3.6 Key Management73
3.7 Recommended Reading75
3.8 Problems75
Appendix 3A:Prime Numbers and Modular Arithmetic77
PART TWO NETWORK SECURITY APPLICATIONS81
CHAPTER 4 Authentication Applications83
4.1 Kerberos84
4.2 X.509 Directory Authentication Service101
4.3 Recommended Reading and Web Sites110
4.4 Problems110
Appendix 4A:Kerberos Encryption Techniques111
CHAPTER 5 Electronic Mail Security117
5.1 Pretty Good Privacy(PGP)118
5.2 S/MIME136
5.3 Recommended Web Sites152
5.4 Problems152
Appendix 5A:Data Compression Using ZIP153
Appendix 5B:Radix-64 Conversion155
Appendix 5C:PGP Random Number Generation157
CHAPTER 6 IP Security161
6.1 IP Security Overview162
6.2 IP Security Architecture165
6.3 Authentication Header171
6.4 Encapsulating Security Payload176
6.5 Combining Security Associations181
6.6 Key Management184
6.7 Recommended Reading and Web Sites193
Appendix 6A:Internetworking and Internet Protocols194
6.8 Problems194
CHAPTER 7 Web Security203
7.1 Web Security Requirements204
7.2 Secure Sockets Layer(SSL)and Transport Layer Security(TLS)206
7.3 Secure Electronic Transaction(SET)223
7.4 Recommended Reading and Web Sites235
7.5 Problems235
CHAPTER 8 Network Management Security237
8.1 Basic Concepts of SNMP238
8.2 SNMPv1 Community Facility246
8.3 SNMPv3248
8.4 Recommended Reading and Web Sites273
8.5 Problems274
PART THREE SYSTEM SECURITY277
CHAPTER 9 Intruders and Viruses279
9.1 Intruders280
9.2 Viruses and Related Threats303
9.3 Recommended Reading and Web Sites316
9.4 Problems317
CHAPTER 10 Firewalls319
10.1 Firewall Design Principles320
10.2 Trusted Systems330
10.3 Recommended Reading336
10.4 Problems336
APPENDIX A RFCs Cited in this Book337
APPENDIX B Projects for Teaching Network Security339
B.1 Research Projects339
B.2 Programming Projects340
B.3 Reading/Report Assignments340
GLOSSARY341
REFERENCES347
INDEX353
热门推荐
- 2257696.html
- 2193404.html
- 3444363.html
- 3795400.html
- 519.html
- 3299590.html
- 2850212.html
- 2554948.html
- 2424745.html
- 3252569.html
- http://www.ickdjs.cc/book_783920.html
- http://www.ickdjs.cc/book_677110.html
- http://www.ickdjs.cc/book_357432.html
- http://www.ickdjs.cc/book_2167816.html
- http://www.ickdjs.cc/book_1961709.html
- http://www.ickdjs.cc/book_2003432.html
- http://www.ickdjs.cc/book_748285.html
- http://www.ickdjs.cc/book_1588794.html
- http://www.ickdjs.cc/book_358011.html
- http://www.ickdjs.cc/book_139002.html