相关图书 |
|
 |
|
|
在线试读 |
|
 |
|
|
|
出版日期:2002年6月 |
版别版次:2002年6月第一版第一次印刷 |
|
印数 :0001-4000 页数:366 |
附带物 :
无附带物 |
|
|
网络安全基础教程—应用与标准(影印版)内容简介
|
随着网络时代的来临,网络安全问题日显突出。病毒、黑客、电子窃听、电子诈骗已成为众多公司和个人业绩和效率的巨大威胁。网络安全作为一门学科的成熟,将会开发出可实际应用的技术来加强网络安全。 本书较详细地介绍了网络安全的基础知识,应用及标准。在概述之后,主要介绍三部分内容:1、密码算法和协议,包括对称密码算法和公钥密码算法,以及哈希函数、密钥分配与交换、数字签名等;2、介绍了目前几种主要的网络安全工具、协议及应用如:Kerberos,x.509v3证书,PGP,S/MIME/IP安全,SSL/TLS以及SET等;3、介...
随着网络时代的来临,网络安全问题日显突出。病毒、黑客、电子窃听、电子诈骗已成为众多公司和个人业绩和效率的巨大威胁。网络安全作为一门学科的成熟,将会开发出可实际应用的技术来加强网络安全。 本书较详细地介绍了网络安全的基础知识,应用及标准。在概述之后,主要介绍三部分内容:1、密码算法和协议,包括对称密码算法和公钥密码算法,以及哈希函数、密钥分配与交换、数字签名等;2、介绍了目前几种主要的网络安全工具、协议及应用如:Kerberos,x.509v3证书,PGP,S/MIME/IP安全,SSL/TLS以及SET等;3、介绍系统级安全问题,包括网络入侵及病毒的危害及对策,防火墙和可信系统等。此外,每章都附有一定量的习题。本书适用作大学本科生的教材,亦可供专业人员参考。
<<
显示内容简介详情
|
|
网络安全基础教程—应用与标准(影印版)目录
|
Preface
CHAPTER 1 Introduction
1.1 Attacks,Services,and Mechanisms 1.2 Security Attacks 1.3 Security Services 1.4 A Model for Internetwork Security 1.5 Internet Standards and RFCs 1.6 Recommended Reading Appendix 1A:Internet and Web Resources
PART ONE CRYPTOGRAPHY
CHAPTER 2 Conventional Encryption and Message Confidentiality
2.1 Conventioanl Encryption Principles 2.2 Conventional Encryption Algorithms 2.3 Cipher Block Modes of Operation 2.4 Location of Encryption Devices 2.5 Key Distribution · · · · · ·
Preface
CHAPTER 1 Introduction
1.1 Attacks,Services,and Mechanisms 1.2 Security Attacks 1.3 Security Services 1.4 A Model for Internetwork Security 1.5 Internet Standards and RFCs 1.6 Recommended Reading Appendix 1A:Internet and Web Resources
PART ONE CRYPTOGRAPHY
CHAPTER 2 Conventional Encryption and Message Confidentiality
2.1 Conventioanl Encryption Principles 2.2 Conventional Encryption Algorithms 2.3 Cipher Block Modes of Operation 2.4 Location of Encryption Devices 2.5 Key Distribution 2.6 Recommended Reading 2.7 Problems
CHAPTER 3 Public-Key Cryptography and Message Authentication
3.1 Approaches to Message Authentication 3.2 Secure Hash Functions and HMAC 3.3 Public Key Cryptography Principles 3.4 Public-Key Cryptography Algorithms 3.5 Digital Signatures 3.6 Key Management 3.7 Recommended Reading 3.8 Problems Appendix 3A:Prime Numbers and Modular Arithmetic
PART TWO NETWORK SECURITY APPLICATIONS
CHAPTER 4 Authentication Applications
4.1 Kerberos 4.2 X.509 Directory Authentication Service 4.3 Recommended Reading and Web Sites 4.4 Problems Appendix 4A:Kerberos Encryption Techniques
CHAPTER 5 Electronic Mail Security
5.1 Pretty Good Privacy(PGP) 5.2 S/MIME 5.3 Recommended Web Sites 5.4 Problems Appendix 5A:data Compressioin Using ZIP Appendix 5B:Radix-64 Conversion Appendix 5C:PGP Random Number Generation
CHAPTER 6 IP Security
6.1 IP Security Overview 6.2 IP Security Architecture 6.3 authentication Header 6.4 Encapsulating Security Payload 6.5 Combining Security Associations 6.6 Key Management 6.7 Recommended Reading and Web Sites 6.8 Problems Appendix 6A:Internetworking and Internet Protocols
CHAPTER 7 Web Security
7.1 Web Securiyt Requirements 7.2 Secure Sockets Layer(SSL)and Transport Layer Security(TLS) 7.3 Secure Electronic Transaction(SET) 7.4 Recommended Reading and Web Sites 7.5 Problems
CHAPTER 8 Network Management Security
8.1 Basic Concepts of SNMP 8.2 SNMPv1 Community Facility 8.3 SNMPv3 8.4 Recommended Reading and Web Sites 8.5 Problems
PART THREE SYSTEM SECURITY
CHAPTER 9 Intruders and Viruses
9.1 Intruders 9.2 Viruses and Related Threats 9.3 Recommended Reading and Web Sites 9.4 Problems
CHAPTER 10 Firewalls
10.1 Firewall Design Principles 10.2 Trusted Systems 10.3 Recommended Reading 10.4 Problems
APPENDIX A RFCs Cited in this Book
APPENDIX B Projects for Teaching Network Security
B.1 Research Projects B.2 Programming Projects B.3 Reading/Report Assignments
GLOSSARY
REFERENCES
INDEX
<<
显示目录详情
|
|
|