出版时间:2007-8 出版社:清华大学出版社 作者:斯托林斯 页数:413
Tag标签:无
内容概要
本书由著名作者William StaUilags编写,完全从实用的角度出发,用较小的篇幅对当前网络安全解决方案中使用的主要算法、重要协议和系统管理方法等内容做了全面而详细的介绍。全书共分为三部分:(1)密码算法和协议,包括网络安全应用中最常用的密码算法和协议;(2)网络安全应用,介绍了网络安全解决方案中使用的各种安全协议,如Kerberos、PGP、S/MIME、IPSec、SSL/TLS和SET等; (3)系统安全,介绍了一些系统级的安全问题,如网络入侵、恶意软件和防火墙等。每章后面都提供了一定数量的推荐读物、网址、思考题和习题等。全书最后还提供了一定数量的项目作业。为方便使用本教材的教师搞好教学,出版社还提供了较为完整的配套服务。与本书的前两版相比,第3版 除在语言和叙述方面做进一步加工提高外,主要增加的内容包括RC4算法、公钥基础设施(PKI)、分布式拒绝服务攻击(DDos)和信息技术安全评估通用准则等。 本书既可作为我国高校相关课程的教材使用,又是满足普通网络安全爱好者学习和了解网络安全基本知识的一本难得好书。
作者简介
作者:(美国)斯托林斯
书籍目录
PrefaceChapter 1 Introduction1.1 Security Trends1.2 The OSI Security Architecture1.3 Security Attacks1.4 Security Services1.5 Security Mechanisms1.6 A Model for Internetwork Security1.7 Internet Standards the Internet Society1.8 Outline of This Book1.9 Recommended Reading1.10 Internet andWeb Resources1.11 Key Terms, Review Questio, and ProblemsPART ONE CRYPTOGRAPHYChapter 2 Symmetric Encryption and Message Confidentiality2.1 Symmetric Encryption Principles2.2 Symmetric Block Encryption Algorithms2.3 Stream Ciphe and RC2.4 Cipher Block Modes of Operation2.5 Location of Encryption Devices2.6 Key Distribution2.7 Recommended Reading andWeb Sites2.8 Key Terms, Review Questio, and ProblemsChapter 3 Public-Key Cryptography and Message Authentication3.1 Approaches to Message Authentication3.2 Secure Hash Functio and HMAC3.3 Public Key Cryptography Principles3.4 Public-Key Cryptography Algorithms3.5 Digital Signatures3.6 Key Management3.7 Recommended Reading andWeb Sites3.8 Key Terms, Review Questio, and ProblemsPART TWO NETWORK SECURITY APPLICATIONSChapter 4 Authentication Applicatio4.1 Kerberos4.2 X.509 Directory Authentication Service4.3 Public Key Infrastructure4.4 Recommended Reading and Web Sites4.4 Key Terms, Review Questio, and ProblemsAppendix 4A: Kerberos Encryption TechniquesChapter 5 Electronic Mail Security5.1 Pretty Good Privacy (PGP)5.2 S/MIME5.3 Recommended Web Sites5.4 Key Terms, Review Questio, and ProblemsAppendix 5A: Data Compression Using ZIPAppendix 5B: Radix-64 ConveionAppendix 5C: PGP Random Number GenerationChapter 6 IP Security6.1 IP Security Overview6.2 IP Security Architecture6.3 Authentication Header6.4 Encapsulating Security Payload6.5 Combining Security Associatio6.6 Key Management6.7 Recommended Reading andWeb Sites6.8 Key Terms, Review Questio, and ProblemsAppendix 6A: Internetworking and Internet ProtocolsChapter 7 Web Security7.1 Web Security Requirements7.2 Secure Sockets Layer (SSL) and Traport Layer Security (TLS)7.3 Secure Electronic Traaction (SET)7.4 Recommended Reading and Web Sites7.5 Key Terms, Review Questio, and ProblemsChapter 8 Network Management Security8.1 Basic Concepts of SNMP8.2 SNMPvl Community Facility8.3 SNMPv8.4 Recommended Reading and Web Sites8.5 Key Terms, Review Questio, and ProblemsPART THREE SYSTEM SECURITYChapter 9 Intrude9.1 Intrude9.2 Intrusion Detection9.3 Password Management9.4 Recommended Reading and Web Sites9.5 Key Terms, Review Questio, and ProblemsAppendix 9A:The Base-Rate FallacyChapter 10 Malicious Software10.1 Viruses and Related Threats10.2 Virus Countermeasures10.3 Distributed Denial of Service Attacks10.4 R ecommended Reading andWeb Sites10.5 Key Terms, Review Questio, and ProblemsChapter 11 Firewalls11.1 Firewall Design Principles11.2 Trusted Systems11.3 Common Criteria for Information Technology Security Evaluation11.4 Recommended Reading and Web Sites11.5 KeyTerms, Review Questio,and ProblemsAPPENDICESAppendix A Some Aspects of Number TheoryA.1 Prime and Relatively Prime NumbeA.2 Modular ArithmeticAppendix B Projects for Teaching Network SecurityB.1 Research ProjectsB.2 Programming ProjectsB.3 Laboratory ExercisesB.4 Writing AssignmentsB.5 Reading/Report AssignmentsGlossaryReferencesIndex
图书封面
图书标签Tags
无
评论、评分、阅读与下载