图书介绍

网络安全基础教程 应用与标准pdf电子书版本下载

网络安全基础教程  应用与标准
  • William Stallings著 著
  • 出版社: 北京:清华大学出版社
  • ISBN:730205536X
  • 出版时间:2002
  • 标注页数:366页
  • 文件大小:65MB
  • 文件页数:380页
  • 主题词:

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

网络安全基础教程 应用与标准PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 Introduction 1

1.1 Attacks,Services,and Mechanisms 4

1.2 Security Attacks 6

1.3 Security Services 9

1.4 A Model for Internetwork Security 11

1.5 Internet Standards and RFCs 13

1.6 Recommended Reading 16

Appendix 1A:Internet and Web Resources 16

PART ONE CRYPTOGRAPHY 19

CHAPTER 2 Conventional Encryption and Message Confidentiality 21

2.1 Conventional Encryption Principles 22

2.2 Conventional Encryption Algorithms 28

2.3 Cipher Block Modes of Operation 37

2.4 Location of Encryption Devices 39

2.5 Key Distribution 42

2.6 Recommended Reading 44

2.7 Problems 44

CHAPTER 3 Public-Key Cryptography and Message Authentication 47

3.1 Approaches to Message Authentication 48

3.2 Secure Hash Functions and HMAC 52

3.3 Public Key Cryptography Principles 62

3.4 Public-Key Cryptography Algorithms 66

3.5 Digital Signatures 72

3.6 Key Management 73

3.7 Recommended Reading 75

3.8 Problems 75

Appendix 3A:Prime Numbers and Modular Arithmetic 77

PART TWO NETWORK SECURITY APPLICATIONS 81

CHAPTER 4 Authentication Applications 83

4.1 Kerberos 84

4.2 X.509 Directory Authentication Service 101

4.3 Recommended Reading and Web Sites 110

4.4 Problems 110

Appendix 4A:Kerberos Encryption Techniques 111

CHAPTER 5 Electronic Mail Security 117

5.1 Pretty Good Privacy(PGP) 118

5.2 S/MIME 136

5.3 Recommended Web Sites 152

5.4 Problems 152

Appendix 5A:Data Compression Using ZIP 153

Appendix 5B:Radix-64 Conversion 155

Appendix 5C:PGP Random Number Generation 157

CHAPTER 6 IP Security 161

6.1 IP Security Overview 162

6.2 IP Security Architecture 165

6.3 Authentication Header 171

6.4 Encapsulating Security Payload 176

6.5 Combining Security Associations 181

6.6 Key Management 184

6.7 Recommended Reading and Web Sites 193

Appendix 6A:Internetworking and Internet Protocols 194

6.8 Problems 194

CHAPTER 7 Web Security 203

7.1 Web Security Requirements 204

7.2 Secure Sockets Layer(SSL)and Transport Layer Security(TLS) 206

7.3 Secure Electronic Transaction(SET) 223

7.4 Recommended Reading and Web Sites 235

7.5 Problems 235

CHAPTER 8 Network Management Security 237

8.1 Basic Concepts of SNMP 238

8.2 SNMPv1 Community Facility 246

8.3 SNMPv3 248

8.4 Recommended Reading and Web Sites 273

8.5 Problems 274

PART THREE SYSTEM SECURITY 277

CHAPTER 9 Intruders and Viruses 279

9.1 Intruders 280

9.2 Viruses and Related Threats 303

9.3 Recommended Reading and Web Sites 316

9.4 Problems 317

CHAPTER 10 Firewalls 319

10.1 Firewall Design Principles 320

10.2 Trusted Systems 330

10.3 Recommended Reading 336

10.4 Problems 336

APPENDIX A RFCs Cited in this Book 337

APPENDIX B Projects for Teaching Network Security 339

B.1 Research Projects 339

B.2 Programming Projects 340

B.3 Reading/Report Assignments 340

GLOSSARY 341

REFERENCES 347

INDEX 353

精品推荐