¼ÆËã»úÍøÂ簲ȫµÄÀíÂÛÓëʵ¼ù£¨Ó¢Îİ棩

  • ËùÊô·ÖÀࣺ
    Ó¢ÓïѧÊõÖø..
  • ×÷Õߣº
    £¨ÃÀ£©Íõ½Ü ±àÖø
  • ³ö°æÉ磺
    ¸ßµÈ½ÌÓý³ö°æÉç
  • ISBN£º9787040241624
  • ³ö°æÈÕÆÚ£º2008-9-1
  • Ô­¼Û£º
    £¤48.00Ôª
    ÏÖ¼Û£º£¤36.00Ôª
  • ±¾ÊéÐÅÏ¢ÓɺÏ×÷ÍøÕ¾Ìṩ£¬ÇëÇ°ÍùÒÔÏÂÍøÕ¾¹ºÂò£º

    ¾©¶«É̳Ç

    ¡¡

    µ±µ±Íø

ͼÊé¼ò½é

Computer Network Security Theory and Practice introduces to the reader a complete and concise view of network security. It provides in-depth theoretical coverage of recent advancements and practical solutions to network security threats. This book can be used for a one-semester network security course for graduate and upper-level undergraduate students, as well as a reference for IT professionals.
Ŀ¼
1 Network Security Overview
1.1 Mission and Definitions
1.2 Common Attacks and Defense Mechanisms
1.2.1 Eavesdropping
1.2.2 Cryptanalysis
1.2.3 Password Pilfering
1.2.4 Identity Spoofing
1.2.5 Buffer-Overflow Exploitations
1.2.6 Repudiation
1.2.7 Intrusion
1.2.8 Traffic Analysis
1.2.9 Denial of Service Attacks
1.2.10 Malicious Software
1.3 Attacker Profiles
1.3.1 Hackers
1.3.2 Script Kiddies
1.3.3 Cyber Spies
1.3.4 Vicious Employees
1.3.5 Cyber Terrorists
1.3.6 Hypothetical Attackers
1.4 Basic Security Model
1.5 Security Resources
1.6 Closing Remarks
1.7 Exercises
2 Data Eneryption Algorithms
2.1 Data Encryption Algorithm Design Criteria
2.1.1 ASCII Code
2.1.2 XOR Encryption
2.1.3 Criteria of Data Encryptions
2.1.4 Implementation Criteria
2.2 Data Encryption Standard
2.2.1 Feistel's Cipher Scheme
2.2.2 DES Subkeys
2.2.3 DES Substitution Boxes
2.2.4 DES Encryption
2.2.5 DES Decryption and Correctness Proof
2.2.6 DES Security Strength
2.3 Multiple DES
2.3.1 Triple-DES with Two Keys
2.3.2 2DES and 3DES/3
2.3.3 Meet-in-the-Middle Attacks on 2DES
2.4 Advanced Encryption Standard
2.4.1 AES Basic Structures
2.4.2 AES S-Boxes
2.4.3 AES-128 RoundKeys
2.4.4 Add Round Keys
2.4.5 Substitute-Bytes
2.4.6 Shift-Rows
2.4.7 Mix-Columns
2.4.8 AES-128 Encryption
2.4.9 AES-128 Decryption and Correctness Proof
2.4.10 Galois Fields
2.4.11 Construction of the AES S-Box and Its Inverse ..
2.4.12 AES Security Strength
2.5 Standard Block-Cipher Modes of Operations
2.5.1 Electronic-Codebook Mode
2.5.2 Cipher-Block-Chaining Mode
2.5.3 Cipher-Feedback Mode
2.5.4 Output-Feedback Mode
2.5.5 Counter Mode
2.6 Stream Ciphers
2.6.1 RC4 Stream Cipher
2.6.2 RC4 Security Weaknesses
2.7 Key Generations
2.7.1 ANSIX9.17 PRNG
2.7.2 BBS Pseudorandom Bit Generator
2.8 Closing Remarks
2.9 Exercises
3 Public-Key Cryptography and Key Management
3.1 Concepts of Public-Key Cryptography
3.2 Elementary Concepts and Theorems in Number Theory .
3.2.1 Modular Arithmetic and Congruence Relations ..
3.2.2 Modular Inverse
3.2.3 Primitive Roots
3.2.4 Fast Modular Exponentiation
3.2.5 Finding Large Prime Numbers
3.2.6 The Chinese Remainder Theorem
3.2.7 Finite Continued Fractions
3.3 Diffie-Hellman Key Exchange
4 Data Authentication
5 Network Security Protocols in Practice
6 Wireless Network Security
7 Network Perimeter Security
8 The Art of Anti Malicious Software
9 The Art of Intrusion Detection
References
Index

ͬÀàÈÈÏúͼÊé

ÊéÃû ×÷Õß ³ö°æÉç ¼Û¸ñ ¹ºÂò
ÈçºÎÇÉÃîÉè¼ÆÓ¢Óï¿ÎÌÃ(½£ÇÅÓ¢Óï¿ÎÌýÌѧϵÁÐ)¡ª¡ªÓ¢Óï½Ìʦ.. £¨Ó¢£©ÎéµÂ.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤34.90

£¤28.50
ÏêÇé
Ñݽ²µÄÒÕÊõ(µÚÊ®°æ/Öйú°æ)(ÅäCD-ROM¹âÅÌ)¡ª¡ªÈ«ÇòÑݽ²Ê¥.. £¨ÃÀ£©Â¬¿¨.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤48.90

£¤40.00
ÏêÇé
бà¼òÃ÷Ó¢ÓïÓïÑÔѧ½Ì³ÌѧϰָÄÏ £¨´÷쿶°¡¢ºÎÕ×Ðܰ桶ÐÂ.. IJÑî¡¡Ö÷±à Î÷ÄϽ»´ó

£¤14.00

£¤9.40
ÏêÇé
ÔõÑù½ÌÓ¢Óï(аæ)(ÓïÑÔѧÎÄ¿â)¡ª¡ªÖйú¹æÄ£×î´ó×î¾ßÓ°ÏìÁ¦.. £¨Ó¢£©¹þĬ.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤27.90

£¤22.80
ÏêÇé
бà¼òÃ÷Ó¢ÓïÓïÑÔѧ½Ì³Ì£¨µÚ2°æ£©Ñ§Ï°Ö¸ÄÏ £¨ÅäÌ×´÷쿶°¡¢.. IJÑî Öø Î÷ÄϽ»Í¨´óѧ³ö°æ..

£¤21.00

£¤15.80
ÏêÇé
ººÓ¢¶Ô±ÈÓïÑÔѧ ³ÂµÂÕᡱà.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤45.90

£¤36.20
ÏêÇé
ÈçºÎÉè¼Æ¿ÎÌ÷º¶Á»î¶¯(½£ÇÅÓ¢Óï¿ÎÌýÌѧϵÁÐ)¡ª¡ªÓ¢Óï½Ìʦ.. £¨Ó¢£©°à¸£.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤29.00

£¤23.20
ÏêÇé
ÈçºÎʹÓÃÓ°Ïñ²ÄÁϽøÐпÎÌýÌѧ(½£ÇÅÓ¢Óï¿ÎÌýÌѧϵÁÐ)¡ª¡ª.. £¨Ó¢£©ÉáÂü.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤37.00

£¤29.60
ÏêÇé
ÈçºÎ¿ªÕ¹¸öÐÔ»¯¿ÎÌýÌѧ(½£ÇÅÓ¢Óï¿ÎÌýÌѧϵÁÐ)¡ª¡ªÓ¢Óï½Ì.. £¨Ó¢£©¸ñÀï.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤22.90

£¤18.30
ÏêÇé
ÔÚÓï¾³ÖнÌÓïÑÔ(Ê¥ÖÇÓ¢Óï½Ìʦ´ÔÊé) £¨ÃÀ£©ºÕµÂ.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤58.90

£¤48.10
ÏêÇé
Ó¢ÓïÓïÒôѧÓëÒôϵѧʵÓý̳Ì(ÓïÑÔѧÎÄ¿â-µÚ3¼­)¡ª¡ªÖйú¹æ.. £¨Ó¢£©ÂÞÆæ.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤39.90

£¤31.90
ÏêÇé
ÃÀÓ¢±¨¿¯µ¼¶Á£¨µÚ¶þ°æ£© ÖÜѧÒÕ¡¡±à.. ±±¾©´óѧ³ö°æÉç

£¤56.00

£¤47.80
ÏêÇé
ÓïÁÏ¿âÓ¦Óý̡̳ª¡ªÈ«¹ú¸ßµÈѧУÍâÓï½Ìʦ½Ìѧʵ¼ùϵÁÐ(¸½.. ÁºÃ¯³É£¬Àî.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤43.90

£¤35.90
ÏêÇé
Ó¢ÓïÊ· ÀÄþ ±à.. ÉÌÎñÓ¡Êé¹Ý

£¤29.00

£¤25.10
ÏêÇé
ÍøÂçÍâÓï½ÌѧÀíÂÛÓëÉè¼Æ ÕźìÁá¡¡µÈ.. ÉϺ£ÍâÓï½ÌÓý³ö°æ..

£¤50.00

£¤39.90
ÏêÇé
¹þÄ·À×ÌØ£¨É¯Ê¿±ÈÑÇ×÷Æ·½â¶Á´ÔÊ顤ӢÎÄÓ°Ó¡²åͼ°æ£© £¨Ó¢£©ÌÀÆÕ.. ÖйúÈËÃñ´óѧ³ö°æ..

£¤39.00

£¤29.30
ÏêÇé
Î÷·½ÓïÑÔѧÁ÷ÅÉ(ÐÂ)¡ª¡ª½éÉÜÎ÷·½ÓïÑÔѧÁ÷ÅɵÄ×îÐÂÁ¦×÷ ÁõÈóÇå ±à.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤29.90

£¤23.90
ÏêÇé
Ç®ÖÓÊéÓ¢ÎÄÎļ¯ Ç®æRÊé Ö.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤43.90

£¤35.10
ÏêÇé
Ó¢Óï½ÌѧÉè¼Æ ³×ÓÎÊ£¬¿µ.. »ª¶«Ê¦·¶´óѧ³ö°æ..

£¤33.00

£¤26.40
ÏêÇé
¸ßУÓëÖÐѧӢÓï½ÌʦºÏ×÷Ðж¯Ñо¿µÄʵ¼ù̽Ë÷ ÍõǾ£¬Õźç.. ÉϺ£½ÌÓý³ö°æÉç

£¤40.00

£¤32.00
ÏêÇé
Ó¢ºº´Ê»ã¶Ô±ÈÑо¿£¨¸´µ©²©Ñ§¡¤ÓïÑÔѧϵÁУ© ²Ì»ù¸Õ Öø ¸´µ©´óѧ³ö°æÉç

£¤30.00

£¤23.80
ÏêÇé
»ùÓÚÓïÁÏ¿âµÄÓïÑÔÑо¿Óë½ÌѧӦÓà ÅËÅË¡¡Öø ÖйúÉç»á¿Æѧ³ö°æ..

£¤47.00

£¤37.60
ÏêÇé
ÈÎÎñÐÍÓïÑÔ½Ìѧ £¨°Ä£©Å¦ÄÏ.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤34.00

£¤27.20
ÏêÇé
ÏÖ´úÍâÓï½ÌѧÓëÑо¿£¨2012£© Î⽭÷¡¡µÈ.. ÖйúÈËÃñ´óѧ³ö°æ..

£¤45.00

£¤34.00
ÏêÇé
Ó¢ÓïÏ°ÓïµÄÎÄ»¯ÄÚº­¼°ÆäÓïÓÃÑо¿ ÕÅÕò»ª µÈ.. ÍâÓï½ÌѧÓëÑо¿³ö..

£¤32.90

£¤24.70
ÏêÇé