书籍 网络安全基础  应用与标准  第5版的封面

网络安全基础 应用与标准 第5版PDF电子书下载

(美)威廉·斯托林斯(William Stallings)著

购买点数

14

出版社

北京:清华大学出版社

出版时间

2019

ISBN

标注页数

423 页

PDF页数

438 页

图书目录

Chapter 1 Introduction 1

1.1 Computer Security Concepts 4

1.2 The OSI Security Architecture 8

1.3 Security Attacks 9

1.4 Security Services 11

1.5 Security Mechanisms 15

1.6 A Model for Network Security 16

1.7 Standards 19

1.8 Outline of This Book 19

1.9 Recommended Reading 20

1.10 Internet and Web Resources 20

1.11 Key Terms, Review Questions, and Problems 21

PART ONE CRYPTOGRAPHY 23

Chapter 2 Symmetric Encryption and Message Confidentiality 23

2.1 Symmetric Encryption Principles 25

2.2 Symmetric Block Encryption Algorithms 30

2.3 Random and Pseudorandom Numbers 36

2.4 Stream Ciphers and RC4 41

2.5 Cipher Block Modes of Operation 46

2.6 Recommended Reading 51

2.7 Key Terms, Review Questions, and Problems 52

Chapter 3 Public-Key Cryptography and Message Authentication 57

3.1 Approaches to Message Authentication 59

3.2 Secure Hash Functions 63

3.3 Message Authentication Codes 70

3.4 Public-Key Cryptography Principles 76

3.5 Public-Key Cryptography Algorithms 79

3.6 Digital Signatures 87

3.7 Recommended Reading 88

3.8 Key Terms, Review Questions, and Problems 88

PART TWO NETWORK SECURITY APPLICATIONS 95

Chapter 4 Key Distribution and User Authentication 95

4.1 Symmetric Key Distribution Using Symmetric Encryption 96

4.2 Kerberos 98

4.3 Key Distribution Using Asymmetric Encryption 111

4.4 X.509 Certificates 113

4.5 Public-Key Infrastructure 121

4.6 Federated Identity Management 123

4.7 Recommended Reading 129

4.8 Key Terms, Review Questions, and Problems 130

Chapter 5 Network Access Control and Cloud Security 135

5.1 Network Access Control 136

5.2 Extensible Authentication Protocol 139

5.3 IEEE 802.1X Port-Based Network Access Control 143

5.4 Cloud Computing 145

5.5 Cloud Security Risks and Countermeasures 152

5.6 Data Protection in the Cloud 154

5.7 Cloud Security as a Service 157

5.8 Recommended Reading 160

5.9 Key Terms, Review Questions, and Problems 161

Chapter 6 Transport-Level Security 162

6.1 Web Security Considerations 163

6.2 Secure Sockets Layer (SSL) 165

6.3 Transport Layer Security (TLS) 179

6.4 HTTPS 183

6.5 Secure Shell (SSH) 184

6.6 Recommended Reading 195

6.7 Key Terms, Review Questions, and Problems 196

Chapter 7 Wireless Network Security 198

7.1 Wireless Security 199

7.2 Mobile Device Security 202

7.3 IEEE 802.11 Wireless LAN Overview 206

7.4 IEEE 802.11i Wireless LAN Security 212

7.5 Recommended Reading 226

7.6 Key Terms, Review Questions, and Problems 227

Chapter 8 Electronic Mail Security 230

8.1 Pretty Good Privacy (PGP) 231

8.2 S/MIME 239

8.3 DomainKeys Identified Mail (DKIM) 255

8.4 Recommended Reading 262

8.5 Key Terms, Review Questions, and Problems 262

Chapter 9 IP Security 264

9.1 IP Security Overview 266

9.2 IP Security Policy 270

9.3 Encapsulating Security Payload 276

9.4 Combining Security Associations 283

9.5 Internet Key Exchange 287

9.6 Cryptographic Suites 295

9.7 Recommended Reading 297

9.8 Key Terms, Review Questions, and Problems 297

PART THREE SYSTEM SECURITY 299

Chapter 10 Malicious Software 299

10.1 Types of Malicious Software (Malware) 300

10.2 Propagation—Infected Content—Viruses 303

10.3 Propagation—Vulnerability Exploit—Worms 308

10.4 Propagation—Social Engineering—SPAM E-mail, Trojans 313

10.5 Payload—System Corruption 315

10.6 Payload—Attack Agent—Zombie, Bots 316

10.7 Payload—Information Theft—Keyloggers, Phishing, Spyware 318

10.8 Payload—Stealthing—Backdoors, Rootkits 319

10.9 Countermeasures 321

10.10 Distributed Denial of Service Attacks 327

10.11 Recommended Reading 332

10.12 Key Terms, Review Questions, and Problems 333

Chapter 11 Intruders 336

11.1 Intruders 338

11.2 Intrusion Detection 342

11.3 Password Management 357

11.4 Recommended Reading 368

11.5 Key Terms, Review Questions, and Problems 369

Chapter 12 Firewalls 373

12.1 The Need for Firewalls 374

12.2 Firewall Characteristics 375

12.3 Types of Firewalls 377

12.4 Firewall Basing 383

12.5 Firewall Location and Configurations 386

12.6 Recommended Reading 391

12.7 Key Terms, Review Questions, and Problems 391

APPENDICES 395

Appendix A Some Aspects of Number Theory 395

A.1 Prime and Relatively Prime Numbers 396

A.2 Modular Arithmetic 398

Appendix B Projects for Teaching Network Security 400

B.1 Research Projects 401

B.2 Hacking Project 402

B.3 Programming Projects 402

B.4 Laboratory Exercises 403

B.5 Practical Security Assessments 403

B.6 Firewall Projects 403

B.7 Case Studies 404

B.8 Writing Assignments 404

B.9 Reading/Report Assignments 404

References 405

Index 412

查看更多关于的内容

本类热门
在线购买PDF电子书
下载此书RAR压缩包