成功加入购物车
[美] 王杰 著 / 高等教育出版社 / 2008-09 / 平装
售价 ¥ 40.00 8.3折
定价 ¥48.00
品相 九五品
优惠 满包邮
延迟发货说明
上书时间2021-07-08
卖家超过10天未登录
Computer Network Security:Theory And Practice(英文版)
《ComputerNetworkSecurity:TheoryAndPractice》introducestothereaderacompleteandconciseviewofnetworksecurity.Itprovidesin-depththeoreticalcoverageofrecentadvancementsandpracticalsolutionstonetworksecuritythreats.Thisbookcanbeusedforaone-semesternetworksecuritycourseforgraduateandupper-levelundergraduatestudents,aswellasareferenceforITprofessionals.
Dr.WanghasbeenProfessorofComputerScienceattheUniversityofMassachusettsLowellsince2001,DirectorofitsCenterforNetworkandInformationSecuritysince2004,andChairmanofitsDepartmentofComputerSciencesince2007.
1NetworkSecurityOverview1.1MissionandDefinitions1.2CommonAttacksandDefenseMechanisms1.2.1Eavesdropping1.2.2Cryptanalysis1.2.3PasswordPilfering1.2.4IdentitySpoofing1.2.5Buffer-OverflowExploitations1.2.6Repudiation1.2.7Intrusion1.2.8TrafficAnalysis1.2.9DenialofServiceAttacks1.2.10MaliciousSoftware1.3AttackerProfiles1.3.1Hackers1.3.2ScriptKiddies1.3.3CyberSpies1.3.4ViciousEmployees1.3.5CyberTerrorists1.3.6HypotheticalAttackers1.4BasicSecurityModel1.5SecurityResources1.6ClosingRemarks1.7Exercises2DataEncryptionAlgorithms2.1DataEncryptionAlgorithmDesignCriteria2.1.1ASCIICode2.1.2XOREncryption2.1.3CriteriaofDataEncryptions2.1.4ImplementationCriteria2.2DataEncryptionStandard2.2.1FeistelsCipherScheme2.2.2DESSubkeys2.2.3DESSubstitutionBoxes2.2.4DESEncryption2.2.5DESDecryptionandCorrectnessProof2.2.6DESSecurityStrength2.3MultipleDES2.3.1Triple-DESwithTwoKeys2.3.22DESand3DES/32.3.3Meet-in-the-MiddleAttackson2DES2.4AdvancedEncryptionStandard2.4.1AESBasicStructures2.4.2AESS-Boxes2.4.3AES-128RoundKeys2.4.4AddRoundKeys2.4.5Substitute-Bytes2.4.6Shift-Rows2.4.7Mix-Columns2.4.8AES-128Encryption2.4.9AES-128DecryptionandCorrectnessProof2.4.10GaloisFields2.4.11ConstructionoftheAESS-BoxandItsInverse...2.4.12AESSecurityStrength2.5StandardBlock-CipherModesofOperations2.5.1Electronic-CodebookMode2.5.2Cipher-Block-ChainingMode2.5.3Cipher-FeedbackMode2.5.4Output-FeedbackMode2.5.5CounterMode2.6StreamCiphers2.6.1RC4StreamCipher2.6.2RC4SecurityWeaknesses2.7KeyGenerations2.7.1ANSIX9.17PRNG2.7.2BBSPseudorandomBitGenerator2.8ClosingRemarks2.9Exercises3Public-KeyCryptographyandKeyManagement3.1ConceptsofPublic-KeyCryptography3.2ElementaryConceptsandTheoremsinNumberTheory3.2.1ModularArithmeticandCongruenceRelations3.2.2ModularInverse3.2.3PrimitiveRoots3.2.4FastModularExponentiation3.2.5FindingLargePrimeNumbers3.2.6TheChineseRemainderTheorem3.2.7FiniteContinuedFractions3.3Diffie-HellmanKeyExchange3.3.1KeyExchangeProtocol3.3.2Man-in-the-MiddleAttacks3.3.3ElgamaiPKC3.4RSACryptosystem3.4.1RSAKeyPairs,Encryptions,andDecryptions3.4.2RSAParameterAttacks3.4.3RSAChallengeNumbers3.5Elliptic-CurveCryptography3.5.1CommutativeGroupsonEllipticCurves3.5.2DiscreteEllipticCurves3.5.3ECCEncodings3.5.4ECCEncryptionandDecryption3.5.5ECCKeyExchange3.5.6ECCStrength3.6KeyDistributionsandManagement3.6.1MasterKeysandSessionKeys3.6.2Public-KeyCertificates3.6.3CANetworks3.6.4KeyRings3.7ClosingRemarks3.8Exercises4DataAuthentication4.1CryptographicHashFunctions4.1.1DesignCriteriaofCryptographicHashFunctions..4.1.2QuestforCryptographicHashFunctions4.1.3BasicStructureofStandardHashFunctions4.1.4SHA-5124.1.5WHIRLPOOL4.2CryptographicChecksums4.2.1Exclusive-ORCryptographicChecksums4.2.2DesignCriteriaofMACAlgorithms4.2.3DataAuthenticationAlgorithm4.3HMAC4.3.1DesignCriteriaofHMAC4.3.2HMACAlgorithm4.4OffsetCodebookModeofOperations4.4.1BasicOperations4.4.2OCBEncryptionandTagGeneration4.4.3OCBDecryptionandTagVerification4.5BirthdayAttacks4.5.1ComplexityUpperBoundofBreakingStrongCollisionResistance4.5.2SetIntersectionAttack4.6DigitalSignatureStandard4.7DualSignaturesandElectronicTransactions4.7.1DualSignatureApplications4.7.2DualSignaturesandElectronicTransactions4.8BlindSignaturesandElectronicCash4.8.1RSABlindSignatures4.8.2ElectronicCash4.9ClosingRemarks4.10Exercises5NetworkSecurityProtocolsinPractice5.1CryptoPlacementsinNetworks5.1.1CryptoPlacementattheApplicationLayer5.1.2CryptoPlacementattheTransportLayer5.1.3CryptoPlacementattheNetworkLayer5.1.4CryptoPlacementattheData-LinkLayer5.1.5HardwareversusSoftwareImplementationsofCryptographicAlgorithms5.2Public-KeyInfrastructure5.2.1X.509Public-KeyInfrastructure5.2.2X.509CertificateFormats5.3IPsec:ASecurityProtocolattheNetworkLayer5.3.1SecurityAssociation5.3.2ApplicationModesandSecurityAssociations5.3.3AHFormat5.3.4ESPFormat5.3.5SecretKeyDeterminationandDistribution5.4SSL/TLS:SecurityProtocolsattheTransportLayer5.4.1SSLHandshakeProtocol5.4.2SSLRecordProtocol5.5PGPandS/MIME:EmailSecurityProtocols5.5.1BasicEmallSecurityMechanisms5.5.2PGP5.5.3S/MIME5.6Kerberos:AnAuthenticationProtocol5.6.1BasicIdeas5.6.2Single-RealmKerberos5.6.3Multiple-RealmKerberos5.7SSH:SecurityProtocolsforRemoteLogins5.8ClosingRemarks5.9Exercises6WirelessNetworkSecurity6.1WirelessCommunicationsand802.11WLANStandards6.1.1WLANArchitecture6.1.2802.11Essentials6.1.3WirelessSecurityVulnerabilities6.2WEP6.2.1DeviceAuthenticationandAccessControl6.2.2DataIntegrityCheck6.2.3LLCFrameEncryption6.2.4SecurityFlawsofWEP6.3WPA6.3.1DeviceAuthenticationandAccessControls6.3.2TKIPKeyGenerations6.3.3TKIPMessageIntegrityCode6.3.4TKIPKeyMixing6.3.5WPAEncryptionandDecryption6.3.6WPASecurityStrengthandWeaknesses6.4IEEE802.1li/WPA26.4.1KeyGenerations6.4.2CCMPEncryptionsandMIC6.4.3802.11iSecurityStrengthandWeaknesses6.5BluetoothSecurity6.5.1Piconets6.5.2SecurePairings6.5.3SAFER+BlockCiphers6.5.4BluetoothAlgorithmsEl,E21,andE226.5.5BluetoothAuthentication6.5.6APINCrackingAttack6.5.7BluetoothSecureSimplePairing6.6WirelessMeshNetworkSecurity6.7ClosingRemarks6.8Exercises7NetworkPerimeterSecurity7.1GeneralFramework7.2PacketFilters7.2.1StatelessFiltering7.2.2StatefulFiltering7.3CircuitGateways7.3.1BasicStructures7.3.2SOCKS7.4ApplicationGateways7.4.1CacheGateways7.4.2StatefulPacketInspections7.5TrustedSystemsandBastionHosts7.5.1TrustedOperatingSystems7.5.2BastionhostsandGateways7.6FirewallConfigurations7.6.1Single-HomedBastionHostSystem7.6.2Dual-HomedBastionHostSystem7.6.3ScreenedSubnets7.6.4DemilitarizedZones7.6.5NetworkSecurityTopology7.7NetworkAddressTranslations7.7.1DynamicNAT7.7.2VirtualLocal-AreaNetworks7.7.3SmallOfficeandHomeOfficeFirewalls7.8SettingUpFirewalls7.8.1SecurityPolicy7.8.2BuildingALinuxStatelessPacketFilter7.9ClosingRemarks7.10Exercises8TheArtofAntiMaliciousSoftware8.1Viruses8.1.1VirusTypes8.1.2VirusInfectionSchemes8.1.3VirusStructures8.1.4CompressorViruses8.1.5VirusDisseminations8.1.6Win32VirusInfectionDissection8.1.7VirusCreationToolkits8.2Worms8.2.1CommonWormTypes8.2.2TheMorrisWorm8.2.3TheMelissaWorm8.2.4EmailAttachments8.2.5TheCodeRedWorm8.2.6OtherWormsTargetedatMicrosoftProducts8.3VirusDefense8.3.1StandardScanningMethods8.3.2Anti-VirusSoftwareProducts8.3.3VirusEmulator8.4TrojanHorses8.5Hoaxes8.6Peer-to-PeerSecurity8.6.1P2PSecurityVulnerabilities8.6.2P2PSecurityMeasures8.6.3InstantMessaging8.7WebSecurity8.7.1BasicTypesofWebDocuments8.7.2SecurityofWebDocuments8.7.3ActiveX8.7.4Cookies8.7.5Spyware8.7.6AJAXSecurity8.7.7SafeWebSurfing8.8DistributedDenialofServiceAttacks8.8.1Master-SlaveDDoSAttacks8.8.2Master-Slave-ReflectorDDoSAttacks8.8.3DDoSAttacksCountermeasures8.9ClosingRemarks8.10Exercises9TheArtofIntrusionDetection9.1BasicIdeasofIntrusionDetection9.1.1BasicMethodology9.1.2Auditing9.1.3IDSComponents9.1.4IDSArchitecture9.1.5IntrusionDetectionPolicies9.1.6UnacceptableBehaviors9.2Network-BasedDetectionsandHost-BasedDetections9.2.1Network-BasedDetections9.2.2Host-BasedDetections9.3SignatureDetections9.3.1NetworkSignatures9.3.2Host-BasedSignatures9.3.3OutsiderBehaviorsandInsiderMisuses9.3.4SignatureDetectionSystems9.4StatisticalAnalysis9.4.1EventCounter9.4.2EventGauge9.4.3EventTimer9.4.4ResourceUtilization9.4.5StatisticalTechniques9.5BehavioralDataForensics9.5.1DataMiningTechniques9.5.2ABehavioralDataForensicExample9.6Honeypots9.6.1TypesofHoneypots9.6.2Honeyd9.6.3MWCollectProjects9.6.4HoneynetProjects9.7ClosingRemarks9.8ExercisesA7-bitASCIIcodeBSHA-512Constants(inhexadecimal)..CDataCompressionusingZIPDBase64EncodingECrackingWEPKeysusingWEPCrackE.1SystemSetupE.2ExperimentDetailsE.3SampleCodeFAcronymsReferencesIndex
展开全部
配送说明
...
相似商品
为你推荐
开播时间:09月02日 10:30