书名:密码学与网络安全(第2版)(**版)
编号:2247129
ISBN:9787302197966[十位:7302197962]
作者:(印)卡哈特
出版社:清华大学出版社
出版日期:2009年05月
页数:534
定价:53.00 元
参考重量:0.750Kg
-------------------------
图书情况:正版二手旧书,绝不影响正常阅读!
绝无缺页少页,发货前再次检查,请放心购买!
* 内容提要 *
本书以清晰的脉络、简洁的语言,介绍了各种加密技术、网络安全协议与实现技术等内容,包括各种对称密钥算法与AES,非对称密钥算法、数字签名与RSA,数字*书与公钥基础设施,Internet安全协议,用户认证与Kerberos,Java、.NET和操作系统的加密实现,网络安全、防火墙与VPN,并给出了具体的加密与安全的案例实现分析,是一本关于密码学与网络安全的理论结合实践的优秀教材。
* 图书目录 *
Preface to the Second Editon
jace to the Second Editon
Preface to the First Editon
jace to the First Editon
Important Terms andAbbreviations
1. Attacks on Computers and Computer Security
1.1 intfoduction 1
1.2 The Need for Security
1.3 SecuritV Approaches
1.4 Principles of Security
1.5 TVves of Attacks
Summary
Multiple-choice Ouestions
pie-choice Questions
Exercises
Design/Programming Exercises
2. Cryptography: Concepts and Techniques
2.1 Intfoduction
2.2 Plain Text and Cipher Text
2.3 Substitution Techniques
2.4 Transposition Techniques
2.5 EncrVption and DecrVption
2.6 Symmetric and AsVmmetric Key Cryptography
2.7 Steganography
2.8 Key Range and Key Size
2.9 Possible TVves of Attacks
Summary
Multiple-choice Ouestions
pie-choice Questions
Exercises
Design/Programming Exercises
3. Symmetric Key Algorithms and AES
3.1 Introduction
3.2 Algorithm Types and Modes
3.3 An Overview of Symmetric Key Cryptography
3.4 Data Encryption Standard (DES)
3.5 International Data Encryption Algorithm (IDEA)
3.6 RC4
3.7 RCS
3.8 Blowfish
3.9 Advanced Encryption Standard (AES)
Summary
Multiple-choice Questions
Exercises
Design/Programming Exercises
4. Asymmetric Key Algorithms, Digital Signatures and RSA
4.1 Introduction
4.2 Brief History of Asymmetric Key Cryptography
4.3 An Overview of Asymmetric Key Cryptography
4.4 The RSA Algorithm
4.5 Symmetric and Asymmetric Key Cryptography Together
4.6 Digital Signatures
4.7 KnapsackAlgorithm
4.8 Some Other Algorithms
Summary
Multiple--choice Questions
Exercises
Design/Programming Exercises
5. Digital Certificates and Public Key infrastructure (PKI)
5.1 Introduction
5.2 Digital Certificates
5.3 Private Key Management
5.4 The PKIX Model
5.5 Public Key Cryptography Standards (PKCS)
5.6 XML, PKI and Security
5.7 Creating Digital Certificates Using Java
Summary
Multiple-choice Questions
Exercises
Design/Programming Exercises
6. Internet Security Protocols
7. User Authentication and Kerberos
8. Cryptography in lava, .NET and Operating Systems
9. Network Security, Firewalls and Virtual Private Networks (VPN)
10. Case Studies on Cryptography and Security
APPendixA: Mathematical Background
APPendix B: Number Systems
APPendix C: Information Theory
APPendixD: Real-ide TOols
APPendix E: Web Resources
APPendix F: A Brief introduction tO ASN, BER, DER
References
* 文章节选 *
暂无相关介绍
* 编辑推荐与评论 *
【本书特点】
本书语言表达流畅、简洁,使本书的阅读不再枯燥。
全书多达425幅插图,极大地方便了读者的学习和理解。
全书提供了丰富的多项选择题、练习题、设计与编程题,有利于加深读者对所学知识的理解和掌握。
* 作者介绍 *
暂无相关介绍
-
暂无评论。