网络安全基础教程:应用与标准

网络安全基础教程:应用与标准
作 者: William Stallings
出版社: 清华大学出版社
丛编项: 大学计算机教育国外著名教材教参系列
版权说明: 本书为公共版权或经版权方授权,请支持正版图书
标 签: 网络安全
ISBN 出版时间 包装 开本 页数 字数
未知 暂无 暂无 未知 0 暂无

作者简介

暂缺《网络安全基础教程:应用与标准》作者简介

内容简介

(网络安全基础教程:应用与标准)WilliamStallings著随着网络时代的来临,网络安全问题日显突出。病毒、黑客、电子窃听、电子诈骗已成为众多公司和个人业绩及效率的巨大威胁。网络安全作为一门学科的成熟,将会开发出可实际应用的技术来加强网络安全。本书较详细地介绍了网络安全的基础知识,应用及标准。在概述之后,主要介绍三部分内容:1.密码算法和协议,包括对称密码算法和公钥密码算法,以及哈希函数、密钥分配与交换、数字签名等;2.介绍了目前几种主要的网络安全工具、协议及应用,如:Kerberos,x.509v3证书,PGP,S/MIME,IP安全,SSL/TLS以及SET等;3.介绍系统级安全问题,包括网络入侵及病毒的危害及对策,防火墙和可信系统等。此外,每章都附有一定量的习题。本书适用作大学本科生的教材,亦可供专业人员参考。

图书目录

Preface

CHAPTER 1 Introduction

1.1 Attacks,Services,and Mechanisms

1.2 Security Attacks

1.3 Security Services

1.4 A Model for Internetwork Security

1.5 Internet Standards and RFCs

1.6 Recommended Reading

Appendix 1A:Internet and Web Resources

PART ONE CRYPTOGRAPHY

CHAPTER 2 Conventional Encryption and Message Confidentiality

2.1 Conventioanl Encryption Principles

2.2 Conventional Encryption Algorithms

2.3 Cipher Block Modes of Operation

2.4 Location of Encryption Devices

2.5 Key Distribution

2.6 Recommended Reading

2.7 Problems

CHAPTER 3 Public-Key Cryptography and Message Authentication

3.1 Approaches to Message Authentication

3.2 Secure Hash Functions and HMAC

3.3 Public Key Cryptography Principles

3.4 Public-Key Cryptography Algorithms

3.5 Digital Signatures

3.6 Key Management

3.7 Recommended Reading

3.8 Problems

Appendix 3A:Prime Numbers and Modular Arithmetic

PART TWO NETWORK SECURITY APPLICATIONS

CHAPTER 4 Authentication Applications

4.1 Kerberos

4.2 X.509 Directory Authentication Service

4.3 Recommended Reading and Web Sites

4.4 Problems

Appendix 4A:Kerberos Encryption Techniques

CHAPTER 5 Electronic Mail Security

5.1 Pretty Good Privacy(PGP)

5.2 S/MIME

5.3 Recommended Web Sites

5.4 Problems

Appendix 5A:data Compressioin Using ZIP

Appendix 5B:Radix-64 Conversion

Appendix 5C:PGP Random Number Generation

CHAPTER 6 IP Security

6.1 IP Security Overview

6.2 IP Security Architecture

6.3 authentication Header

6.4 Encapsulating Security Payload

6.5 Combining Security Associations

6.6 Key Management

6.7 Recommended Reading and Web Sites

6.8 Problems

Appendix 6A:Internetworking and Internet Protocols

CHAPTER 7 Web Security

7.1 Web Securiyt Requirements

7.2 Secure Sockets Layer(SSL)and Transport Layer Security(TLS)

7.3 Secure Electronic Transaction(SET)

7.4 Recommended Reading and Web Sites

7.5 Problems

CHAPTER 8 Network Management Security

8.1 Basic Concepts of SNMP

8.2 SNMPv1 Community Facility

8.3 SNMPv3

8.4 Recommended Reading and Web Sites

8.5 Problems

PART THREE SYSTEM SECURITY

CHAPTER 9 Intruders and Viruses

9.1 Intruders

9.2 Viruses and Related Threats

9.3 Recommended Reading and Web Sites

9.4 Problems

CHAPTER 10 Firewalls

10.1 Firewall Design Principles

10.2 Trusted Systems

10.3 Recommended Reading

10.4 Problems

APPENDIX A RFCs Cited in this Book

APPENDIX B Projects for Teaching Network Security

B.1 Research Projects

B.2 Programming Projects

B.3 Reading/Report Assignments

GLOSSARY

REFERENCES

INDEX