| 作 者: | 李剑 |
| 出版社: | 北京邮电大学出版社 |
| 丛编项: | |
| 版权说明: | 本书为公共版权或经版权方授权,请支持正版图书 |
| 标 签: | 信息安全 |
| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Chapter 1 Hacker Attack Technology
1.1 Definition and Classification of Attack
1.2 The Process or Methodology Hackers Use to Attack
1.3 The Methods and Ways of Attack
Chapter 2 Cryptography
2.1 Cryptography Introduction
2.2 Substitution Cryptography
2.3 Symmetric-key Cry6ptography
2.4 Public-key Cryptography
2.5 Cryptographic Hash Function
Chapter 3 Firewall
3.1 Introduction
3.2 Firewall Technologies
3.3 Firewall Architectures
3.4 Windows Firewall
3.5 Problems and Benefits of Firewall
Chapter 4 Intrusion Detection System
4.1 Introduction
4.2 State of the Art
4.3 Data Collection
4.4 Data Processing for Detection
4.5 Alarms, Logs and Actions
4.6 Example: Data Mining Approaches for IDS
4.7 Known Problems with IDS
Chapter 5 Network Security Protocol
5.1 Introduction
5.2 Kerberos Protocol
……
Chapter 6 Virtual Private Network
Chapter 7 Computer Virus
Chapter 8 Public-Key Infrastructure
Chapter 9 Information Security Management
参考文献