-
>
全國計(jì)算機(jī)等級(jí)考試最新真考題庫模擬考場(chǎng)及詳解·二級(jí)MSOffice高級(jí)應(yīng)用
-
>
決戰(zhàn)行測(cè)5000題(言語理解與表達(dá))
-
>
軟件性能測(cè)試.分析與調(diào)優(yōu)實(shí)踐之路
-
>
第一行代碼Android
-
>
JAVA持續(xù)交付
-
>
EXCEL最強(qiáng)教科書(完全版)(全彩印刷)
-
>
深度學(xué)習(xí)
計(jì)算機(jī)安全-原理與實(shí)踐-(第二版)-英文版 版權(quán)信息
- ISBN:9787121200342
- 條形碼:9787121200342 ; 978-7-121-20034-2
- 裝幀:一般膠版紙
- 冊(cè)數(shù):暫無
- 重量:暫無
- 所屬分類:>
計(jì)算機(jī)安全-原理與實(shí)踐-(第二版)-英文版 本書特色
《國外計(jì)算機(jī)科學(xué)教材系列:計(jì)算機(jī)安全·原理與實(shí)踐(第2版)(英文版)》可作為高等院校相關(guān)專業(yè)計(jì)算機(jī)安全課程雙語教學(xué)的教材,同時(shí)也是一本有關(guān)密碼學(xué)和計(jì)算機(jī)網(wǎng)絡(luò)安全方面的非常有價(jià)值的參考書。
計(jì)算機(jī)安全-原理與實(shí)踐-(第二版)-英文版 內(nèi)容簡(jiǎn)介
本書在上一版的基礎(chǔ)上進(jìn)行了修訂與更新,全面覆蓋了計(jì)算機(jī)安全領(lǐng)域的相關(guān)主題。全書共分為五個(gè)部分:**部分——計(jì)算機(jī)安全技術(shù)與原理,概述了支持有效安全策略所必需的技術(shù)領(lǐng)域;第二部分——軟件安全與可信系統(tǒng),講解了軟件開發(fā)和運(yùn)行中的安全問題;第三部分——管理問題,主要討論信息與計(jì)算機(jī)安全在管理方面的問題;第四部分——密碼學(xué)算法,給出了各種類型的加密算法和其他類型的密碼算法;第五部分——網(wǎng)絡(luò)安全,重點(diǎn)分析了為網(wǎng)絡(luò)通信提供安全保障的協(xié)議和標(biāo)準(zhǔn)。本書思路清晰、結(jié)構(gòu)嚴(yán)謹(jǐn),并且提供了大量精心設(shè)計(jì)的實(shí)踐問題。
計(jì)算機(jī)安全-原理與實(shí)踐-(第二版)-英文版 目錄
chapter 0 reader's and instructor's guide
0.1 outline of this book
0.2 a roadmap for readers and instructors
0.3 support for cissp certification
0.4 internet and web resources
0.5 standards
chapter 1 overview
1.1 computer security concepts
1.2 threats, attacks, and assets
1.3 security functional requirements
1.4 a security architecture for open systems
1.5 computer security trends
1.6 computer security strategy
1.7 recommended reading and web sites
1.8 key terms, review questions, and problems
part one: computer security technology and principles
chapter 2 cryptographic tools
2.1 confidentiality with symmetric encryption
2.2 message authentication and hash functions
2.3 public-key encryption
2.4 digital signatures and key management
2.5 random and pseudorandom numbers
2.6 practical application: encryption of stored data
2.7 recommended reading and web sites
2.8 key terms, review questions, and problems
chapter 3 user authentication
3.1 means of authentication
3.2 password-based authentication
3.3 token-based authentication
3.4 biometric authentication
3.5 remote user authentication
3.6 security issues for user authentication
3.7 practical application: an iris biometric system
3.8 case study: security problems for atm systems
3.9 recommended reading and web sites
3.10 key terms, review questions, and problems
chapter 4 access control
4.1 access control principles
4.2 subjects, objects, and access rights
4.3 discretionary access control
4.4 example: unix file access control
4.5 role-based access control
4.6 case study: rbac system for a bank
4.7 recommended reading and web site
4.8 key terms, review questions, and problems
chapter 5 database security
5.1 the need for database security
5.2 database management systems
5.3 relational databases
5.4 database access control
5.5 inference
5.6 statistical databases
5.7 database encryption
5.8 cloud security
5.9 recommended reading and web site
5.10 key terms, review questions, and problems
chapter 6 malicious software
6.1 types of malicious software (malware)
6.2 propagation-infected content-viruses
6.3 propagation-vulnerability exploit-worms
6.4 propagation-social engineering-spam e-mail, trojans
6.5 payload-system corruption
6.6 payload-attack agent-zombie, bots
6.7 payload-information theft-keyloggers, phishing, spyware
6.8 payload-stealthing-backdoors, rootkits
6.9 countermeasures
6.10 recommended reading and web sites
6.11 key terms, review questions, and problems
chapter 7 denial-of-service attacks
7.1 denial-of-service attacks
7.2 flooding attacks
7.3 distributed denial-of-service attacks
7.4 application-based bandwidth attacks
7.5 reflector and amplifier attacks
7.6 defenses against denial-of-service attacks
7.7 responding to a denial-of-service attack
7.8 recommended reading and web sites
7.9 key terms, review questions, and problems
chapter 8 intrusion detection
8.1 intruders
8.2 intrusion detection
8.3 host-based intrusion detection
8.4 distributed host-based intrusion detection
8.5 network-based intrusion detection
8.6 distributed adaptive intrusion detection
8.7 intrusion detection exchange format
8.8 honeypots
8.9 example system: snort
8.10 recommended reading and web sites
8.11 key terms, review questions, and problems
chapter 9 firewalls and intrusion prevention systems
9.1 the need for firewalls
9.2 firewall characteristics
9.3 types of firewalls
9.4 firewall basing
9.5 firewall location and configurations
9.6 intrusion prevention systems
9.7 example: unified threat management products
9.8 recommended reading and web site
9.9 key terms, review questions, and prob
計(jì)算機(jī)安全-原理與實(shí)踐-(第二版)-英文版 作者簡(jiǎn)介
William Stallings,擁有美國麻省理工學(xué)院計(jì)算機(jī)科學(xué)博士學(xué)位,現(xiàn)任教于澳大利亞新南威爾士大學(xué)國防學(xué)院(堪培拉)信息技術(shù)與電子工程系。他是世界知名計(jì)算機(jī)學(xué)者和暢銷教材作者,已經(jīng)撰寫了17部著作,出版了40多本書籍,內(nèi)容涉及計(jì)算機(jī)安全、計(jì)算機(jī)網(wǎng)絡(luò)和計(jì)算機(jī)體系結(jié)構(gòu)等方面,堪稱計(jì)算機(jī)界的全才。他曾九次榮獲美國“教材和學(xué)術(shù)專著作者協(xié)會(huì)”頒發(fā)的“年度最佳計(jì)算機(jī)科學(xué)教材”獎(jiǎng)。
- >
我與地壇
- >
二體千字文
- >
隨園食單
- >
朝聞道
- >
中國歷史的瞬間
- >
羅曼·羅蘭讀書隨筆-精裝
- >
伊索寓言-世界文學(xué)名著典藏-全譯本
- >
我從未如此眷戀人間