描述
开 本: 32开纸 张: 胶版纸包 装: 平装是否套装: 否国际标准书号ISBN: 9787111292470丛书名: 经典原版书库
内容简介
本书系统地介绍了计算机安全领域中的各个方面,全面分析了计算机安全威胁、检测与防范安全攻击的技术方法以及软件安全问题和管理问题。本书重点介绍核心原理,揭示了这些原理是如何将计算机安全领域统一成一体的,并说明了它们在实际系统和网络中的应用。此外,本书还探讨了满足安全需求的各种设计方法,阐释了对于当前安全解决方案至关重要的标准。
本书思路清晰,结构严谨,并且提供了扩展的教学支持——数百个精心设计的实践问题,是高等院校计算机安全专业的理想教材,同时也可作为研究人员和专业技术人员的非常有价值的参考书。
本书思路清晰,结构严谨,并且提供了扩展的教学支持——数百个精心设计的实践问题,是高等院校计算机安全专业的理想教材,同时也可作为研究人员和专业技术人员的非常有价值的参考书。
目 录
Preface
About the Authors
Notation
Acronyms
Chapter 0 Reader’s and Instructor’s Guide
Chapter 1 Overview
PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter 2 Cryptographic Tools
Chapter 3 User Authentication
Chapter 4 Access Control
Chapter 5 Database Security
Chapter 6 Intrusion Detection
Chapter 7 Malicious Software
Chapter 8 Denial of Service
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 10 Trusted Computing and Multilevel Security
PART TWO SOFTWARE SECURITY
Chapter 11 Buffer Overflow
Chapter 12 Other Software Security Issues
PART THREE MANAGEMENT ISSUES
Chapter 13 physical and Infrastructure Security
Chapter 14 Human Factors
Chapter 15 Security Auditing
Chapter 16 IT Security Management and Risk Assessment
Chapter 17 IT Security Controls, Plans and Procedures
Chapter 18 Legal and Ethical Aspects
PART FOUR CRYPTOGRAPHIC ALGORITHMS
Chapter 19 Symmetric Encryption and Message Confidentiality
Chapter 20 Public-Key Cryptography and Message Authentication
PART FIVE INTERNET SECURITY
Chapter 21 Internet Security Protocols and Standards
Chapter 22 Internet Authentication Applications
PART SIX OPERATING SYSTEM SECURITY
Chapter 23 Linux Security 690
Chapter 24 Windows and Windows Vista Security
APPENDICES
Appendix A Some Aspects of Number Theory
Appendix B Random and Pseudorandom Number Generation
Appendix C Projects for Teaching Computer Security
References
Index
ONLINE APPENDICES
Appendix D Standards and Standard-Setting Organizations
Appendix E TCP/IP Protocol Architecture
Appendix F Glossary
About the Authors
Notation
Acronyms
Chapter 0 Reader’s and Instructor’s Guide
Chapter 1 Overview
PART ONE COMPUTER SECURITY TECHNOLOGY AND PRINCIPLES
Chapter 2 Cryptographic Tools
Chapter 3 User Authentication
Chapter 4 Access Control
Chapter 5 Database Security
Chapter 6 Intrusion Detection
Chapter 7 Malicious Software
Chapter 8 Denial of Service
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 10 Trusted Computing and Multilevel Security
PART TWO SOFTWARE SECURITY
Chapter 11 Buffer Overflow
Chapter 12 Other Software Security Issues
PART THREE MANAGEMENT ISSUES
Chapter 13 physical and Infrastructure Security
Chapter 14 Human Factors
Chapter 15 Security Auditing
Chapter 16 IT Security Management and Risk Assessment
Chapter 17 IT Security Controls, Plans and Procedures
Chapter 18 Legal and Ethical Aspects
PART FOUR CRYPTOGRAPHIC ALGORITHMS
Chapter 19 Symmetric Encryption and Message Confidentiality
Chapter 20 Public-Key Cryptography and Message Authentication
PART FIVE INTERNET SECURITY
Chapter 21 Internet Security Protocols and Standards
Chapter 22 Internet Authentication Applications
PART SIX OPERATING SYSTEM SECURITY
Chapter 23 Linux Security 690
Chapter 24 Windows and Windows Vista Security
APPENDICES
Appendix A Some Aspects of Number Theory
Appendix B Random and Pseudorandom Number Generation
Appendix C Projects for Teaching Computer Security
References
Index
ONLINE APPENDICES
Appendix D Standards and Standard-Setting Organizations
Appendix E TCP/IP Protocol Architecture
Appendix F Glossary
评论
还没有评论。