INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 mobi 下载 网盘 caj lrf pdf txt 阿里云

INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践电子书下载地址
- 文件名
- [epub 下载] INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 epub格式电子书
- [azw3 下载] INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 azw3格式电子书
- [pdf 下载] INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 pdf格式电子书
- [txt 下载] INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 txt格式电子书
- [mobi 下载] INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 mobi格式电子书
- [word 下载] INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 word格式电子书
- [kindle 下载] INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践 kindle格式电子书
内容简介:
Your expert guide to information security
As businesses and c***umers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is ***anized around four major themes:
·Cryptography: classic cryptosystems, symmetric key cryptography, public key cryptography, hash functi***, random numbers, information hiding, and crypt***ysis
·Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multila***l security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems
·Protocols: *** authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and G***
·Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security
Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems-ranging from basic to challenging-to help readers apply their newly developed skills. A soluti*** manual and a set of classroom-tested PowerPoint(r) slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues.
An Instructor's Manual presenting detailed soluti*** to all the problems in the book is available from the Wiley editorial department.
An Instructor Support FTP site is also available.
书籍目录:
Preface.
About The Author.
Acknowledgments.
1. Introduction.
1.1 The Cast of Characters.
1.2 Alice's Online Bank.
1.2.1 Confidentiality, Integrity and.
1.2.2 Beyond CIA.
1.3 About This Book.
1.3.1 Cryptography.
1.3.2 Access Control.
1.3.3 Protocols.
1.3.4 Software.
1.4 The People Problem.
1.5 Theory and Practice.
1.6 Problems.
Ⅰ. CRYPTO.
2. Crypto Basics.
2.1 Introduction.
2.2 How to Speak Crypto.
2.3 Classic Crypto.
2.3.1 Simple Substitution Cipher.
2.3.2 Crypt***ysis of a Simple Substitution.
2.3.3 Definition of Secure.
2.3.4 Double Transposition Cipher.
2.3.5 One-time Pad.
2.3.6 Project VENONA.
2.3.7 Codebook Cipher.
2.3.8 Ciphers of the Election of 1876.
2.4 Modern Crypto History.
2.5 A Taxonomy of Cryptography.
2.6 A Taxonomy of Crypt***ysis.
2.7 Summary.
2.8 Problems.
3. Symmetric Key Crypto.
3.1 Introduction.
3.2 Stream Ciphers.
3.2.1 A5/1.
3.2.2 RC4.
3.3 Block Ciphers.
3.3.1 Feistel Cipher.
3.3.2 DES.
3.3.3 Triple DES.
3.3.4 AES.
3.3.5 Three More Block Ciphers.
3.3.6 TEA.
3.3.7 Block Cipher Modes.
3.4 Integrity.
3.5 Summary.
3.6 Problems.
4. Public Key Crypto.
4.1 Introduction.
4.2 Knapsack.
4.3 RSA.
4.3.1 RSA Example.
4.3.2 Repeated Squaring.
4.3.3 Speeding Up RSA.
4.4 Diffie-Hellman.
4.5 Elliptic Curve Cryptography.
4.5.1 Elliptic Curve Math.
4.5.2 ECC Diffie-Hellman.
4.6 Public Key Notation.
4.7 Uses for Public Key Crypto.
4.7.1 Confidentiality in the Real World.
4.7.2 Signatures and Non-repudiation.
4.7.3 Confidentiality and Non-repudiation.
4.8 Public Key Infrastructure.
4.9 Summary.
4.10 Problems.
5. Hash Functi*** and Other Topics.
5.1 What is a Hash Function?
5.2 The Birthday Problem.
5.3 Non-cryptographic Hashes.
5.4 Tiger Hash.
5.5 HMAC.
5.6 Uses of Hash Functi***.
5.6.1 Online Bids.
5.6.2 Spam Reduction.
5.7 Other Crypto-Related Topics.
5.7.1 Secret Sharing.
Key Escrow.
5.7.2 Random Numbers.
Texas Hold 'em Poker.
Generating Random Bits.
5.7.3 Information Hiding.
5.8 Summary.
5.9 Problems.
6. Advanced Crypt***ysis.
6.1 Introduction.
6.2 Linear and Differential Crypt***ysis.
6.2.1 Quick Review of DES.
6.2.2 Overview of Differential Crypt***ysis.
6.2.3 Overview of Linear Crypt***ysis.
6.2.4 Tiny DES.
6.2.5 Differential Crypt***ysis of TDES.
6.2.6 Linear Crypt***ysis of TDES.
6.2.7 Block Cipher Design.
6.3 Side Channel Attack on RSA.
*** Lattice Reduction and the Knapsack.
6.5 Hellman's Time-Memory Tradeo_.
6.5.1 Popcnt.
6.5.2 Crypt***ytic TMTO.
6.5.3 Misbehaving Chains.
6.5.4 Success Probability.
6.6 Summary.
6.7 Problems.
Ⅱ. ACCESS CONTROL.
7. Authentication.
7.1 Introduction.
7.2 Authentication Methods.
7.3 Passwords.
7.3.1 Keys versus Passwords.
7.3.2 Choosing Passwords.
7.3.3 Attacking Systems via Passwords.
7.3.4 Password Verification.
7.3.5 Math of Password Cracking.
7.3.6 Other Password Issues.
7.4 Biometrics.
7.4.1 Types of Errors.
7.4.2 Biometric Examples.
Fingerprints.
Hand Geometry.
Iris Scan.
7.4.3 Biometric Error Rates.
7.4.4 Biometric Conclusi***.
7.5 Something You Have.
7.6 Two-Factor Authentication.
7.7 Single Sign-On and Web Cookies.
7.8 Summary.
7.9 Problems.
8. Authorization.
8.1 Introduction.
8.2 Access Control.
8.2.1 ACLs and Capabilities.
8.2.2 Confused Deputy.
8.3 Multilevel Security Models.
8.3.1 Bell-LaPadula.
8.3.2 Biba's Model.
8.4 Multila***l Security.
8.5 Covert Channel.
8.6 Inference Control.
8.7 CAP***HA.
8.8 Firewalls.
8.8.1 Packet Filter.
8.8.2 Stateful Packet Filter.
8.8.3 Application Proxy.
8.8.4 Personal Firewall.
8.8.5 Defense in Depth.
8.9 Intrusion Detection.
8.9.1 Signature-based IDS.
8.9.2 Anomaly-based IDS.
8.10 Summary.
8.11 Problems.
Ⅲ PROTOCOLS.
9. Simple Authentication Protocols.
9.1 Introduction.
9.2 Simple Security Protocols.
9.3 Authentication Protocols.
9.3.1 Authentication Using Symmetric Keys.
9.3.2 Authentication Using Public Keys.
9.3.3 Session Keys.
9.3.4 Perfect Forward Secrecy.
9.3.5 Mutual Authentication, Session Key and PFS.
9.3.6 Timestamps.
9.4 Authentication and ***P.
9.5 Zero Knowledge Proofs.
9.6 The Best Authentication Protocol?
9.7 Summary.
9.8 Problems.
10. Real-World Security Protocols.
10.1 Introduction.
10.2 Secure Socket Layer.
10.2.1 SSL and the Man-in-the-Middle.
10.2.2 SSL Connecti***.
10.2.3 SSL versus IPSec.
10.3 IPSec.
10.3.1 IKE Phase 1: Digital Signature.
10.3.2 IKE Phase 1: Symmetric Key.
10.3.3 IKE Phase 1: Public Key Encryption.
10.3.4 IPSec Cookies.
10.3.5 IKE Phase 1 Summary.
10.3.6 IKE Phase 2.
10.3.7 IPSec and IP Datagrams.
10.3.8 Transport and Tunnel Modes.
10.3.9 ESP and AH.
10.4 Kerberos.
10.4.1 Kerberized Login.
10.4.2 Kerberos Ticket.
10.4.3 Kerberos Security.
10.5 G***.
10.5.1 G*** Architecture.
10.5.2 G*** Security Architecture.
Anonymity.
Authentication.
Confidentiality.
10.5.3 G*** Authentication Protocol.
10.5.4 G*** Security Flaws.
Crypto Flaws.
Invalid Assumpti***.
SIM Attacks.
Fake Base Station.
10.5.5 G*** Conclusi***.
10.5.6 3GPP.
10.6 Summary.
10.7 Problems.
Ⅳ SOFTWARE.
11. Software Flaws and Malware.
11.1 Introduction.
11.2 Software Flaws.
11.2.1 Buffer Overflow.
Buffer Overflow Example.
Stack Smashing Prevention.
Buffer Overflow: The Last Word.
11.2.2 Incomplete Mediation.
11.2.3 Race Conditi***.
11.3 Malware.
11.3.1 Brain.
11.3.2 Morris Worm.
11.3.3 Code Red.
11.3.4 SQL Slammer.
11.3.5 Trojan Example.
11.3.6 Malware Detection.
Signature Detection.
Change Detection.
Anomaly Detection.
11.3.7 The Future of Malware.
11.3.8 Cyber Diseases versus Biological Diseases.
11.4 Miscellaneous Software-Based Attacks.
11.4.1 Salami Attacks.
11.4.2 Linearization Attacks.
11.4.3 Time Bombs.
11.4.4 Trusting Software.
11.5 Summary.
11.6 Problems.
12. Insecurity in Software.
12.1 Introduction.
12.2 Software Reverse Engineering.
12.2.1 Anti-disassembly Techniques.
12.2.2 Anti-debugging Techniques.
12.3 Software Tamper-resistance.
12.3.1 Guards.
12.3.2 Obfuscation.
12.3.3 Metamorphism Revisited.
12.4 Digital Rights Management.
12.4.1 What is DRM?
12.4.2 A Real-World DRM System.
12.4.3 DRM for Streaming Media.
12.4.4 DRM for a P2P Application.
12.4.5 DRM in the Enterprise.
12.4.6 DRM Failures.
12.4.7 DRM Conclusi***.
12.5 Software Development.
12.5.1 Open versus Closed Source Software.
12.5.2 Finding Flaws.
12.5.3 Other Software Development Issues.
12.6 Summary.
12.7 Problems.
13. Operating Systems and Security.
13.1 Introduction.
13.2 Operating System Security Functi***.
13.2.1 Separation.
13.2.2 Memory Protection.
13.2.3 Access Control.
13.3 Trusted Operating System.
13.3.1 MAC, DAC and More.
13.3.2 Trusted Path.
13.3.3 Trusted Computing Base.
13.4 Next Generation Secure Computing Base.
13.4.1 NGSCB Feature Groups.
Process Isolation.
Sealed Storage.
Secure Path.
Attestation.
13.4.2 NGSCB Compelling Applicati***.
13.4.3 Criticisms of NGSCB.
13.5 Summary.
13.6 Problems.
Appendices.
A-1 Networking Basics.
A-1.1 Introduction.
A-1.2 The Protocol Stack.
A-1.3 Application Layer.
A-1.4 Transport Layer.
A-1.5 Network Layer.
A-1.6 Link Layer.
A-1.7 Conclusi***.
A-2 Math Essentials.
A-2.1 Modular Arithmetic.
A-2.2 Permutati***.
A-2.3 Probability.
A-2.4 Linear Algebra.
A-3 DES S-boxes.
Annotated Bibliography.
Index
作者介绍:
暂无相关内容,正在全力查找中
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
编辑推荐
作者简介:
MARK STAMP, PHD, is Professor of Computer Science, San José State University, where he teaches undergraduate and graduate-level information security courses. In addition to his experience gained in private industry and academia, Dr. Stamp has seven years' experience working as a crypt***yst at the U.S. National Security Agency.
书籍介绍
This is your expert guide to information security. As businesses and c***umers become more dependent on complex multinational information systems, the need to understand and devise sound information security systems has never been greater. This title takes a practical approach to information security by focusing on real-world examples. While not sidestepping the theory, the emphasis is on developing the skills and knowledge that security and information technology students and professionals need to face their challenges. The book is ***anized around four major themes: Cryptography: classic cryptosystems, symmetric key; cryptography, public key cryptography, hash functi***, random numbers, information hiding, and crypt***ysis Access control: authentication and authorization, password-based security, ACLs and capabilities, multilevel and multila***l security, covert channels and inference control, BLP and Biba's models, firewalls, and intrusion detection systems. It also includes protocols: *** authentication protocols, session keys, perfect forward secrecy, timestamps, SSL, IPSec, Kerberos, and G*** Software: flaws and malware, buffer overflows, viruses and worms, software reverse engineering, digital rights management, secure software development, and operating systems security. Additional features include numerous figures and tables to illustrate and clarify complex topics, as well as problems - ranging from basic to challenging - to help readers apply their newly developed skills. A soluti*** manual and a set of classroom-tested PowerPoint[registered] slides will assist instructors in their course development. Students and professors in information technology, computer science, and engineering, and professionals working in the field will find this reference most useful to solve their information security issues. This is an "Instructor's Manual" presenting detailed soluti*** to all the problems in the book is available from the Wiley editorial department. An Instructor Support FTP site is also available.
网站评分
书籍多样性:4分
书籍信息完全性:5分
网站更新速度:5分
使用便利性:8分
书籍清晰度:7分
书籍格式兼容性:9分
是否包含广告:7分
加载速度:6分
安全性:9分
稳定性:6分
搜索功能:9分
下载便捷性:7分
下载点评
- 书籍多(679+)
- 体验好(231+)
- 差评少(359+)
- 简单(596+)
- 少量广告(309+)
- 推荐购买(484+)
下载评价
- 网友 濮***彤:
好棒啊!图书很全
- 网友 宫***凡:
一般般,只能说收费的比免费的强不少。
- 网友 石***烟:
还可以吧,毕竟也是要成本的,付费应该的,更何况下载速度还挺快的
- 网友 曾***文:
五星好评哦
- 网友 冯***卉:
听说内置一千多万的书籍,不知道真假的
- 网友 益***琴:
好书都要花钱,如果要学习,建议买实体书;如果只是娱乐,看看这个网站,对你来说,是很好的选择。
- 网友 戈***玉:
特别棒
- 网友 扈***洁:
还不错啊,挺好
- 网友 国***舒:
中评,付点钱这里能找到就找到了,找不到别的地方也不一定能找到
- 网友 焦***山:
不错。。。。。
- 网友 马***偲:
好 很好 非常好 无比的好 史上最好的
喜欢"INFORMATION SECURITY: PRINCIPLES AND PRACTICE信息安全:原理与实践"的人也看了
9787562941064 mobi 下载 网盘 caj lrf pdf txt 阿里云
应用物理实验 mobi 下载 网盘 caj lrf pdf txt 阿里云
亚森·罗平探案全集2 mobi 下载 网盘 caj lrf pdf txt 阿里云
口腔颌面外科学(第3版/高职口腔)(“十二五”全国高职高专口腔医学和口腔医学技术专业规划教材) mobi 下载 网盘 caj lrf pdf txt 阿里云
城市轨道交通车站消防系统 mobi 下载 网盘 caj lrf pdf txt 阿里云
电动机节能方法与PLC、变频器应用实例 mobi 下载 网盘 caj lrf pdf txt 阿里云
约翰·汤普森现代钢琴教程(Ⅰ多媒体版) mobi 下载 网盘 caj lrf pdf txt 阿里云
养老金业务理论与实务 mobi 下载 网盘 caj lrf pdf txt 阿里云
海洋之星 mobi 下载 网盘 caj lrf pdf txt 阿里云
中国旅游税收理论与税制改革问题研究 高凌江 著 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 治愈者 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 奇妙的身体旅行 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 黑衣修士 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 天文之书 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 青年管理者 管理理论、实践历练与学问修养 张云亭 著 mobi 下载 网盘 caj lrf pdf txt 阿里云
- The Science of Breakable Things 英文原版 易碎事物的科学 纽伯瑞获奖作家 英文版 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 高职英语口语辅学教程 mobi 下载 网盘 caj lrf pdf txt 阿里云
- B 全3册 胡雪岩全传红顶商人商道书籍***正版胡雪岩的启示经商智慧全集谋略大全康熙大帝乾隆皇帝雍正王朝生意经书 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 阳光宝贝翻翻书·儿歌 mobi 下载 网盘 caj lrf pdf txt 阿里云
- 材料科学基础考试试题与解析(第2版)/“十二五”普通高等教育本科国家级规划教材 mobi 下载 网盘 caj lrf pdf txt 阿里云
书籍真实打分
故事情节:9分
人物塑造:3分
主题深度:4分
文字风格:4分
语言运用:9分
文笔流畅:3分
思想传递:7分
知识深度:4分
知识广度:9分
实用性:3分
章节划分:6分
结构布局:8分
新颖与独特:3分
情感共鸣:9分
引人入胜:7分
现实相关:4分
沉浸感:4分
事实准确性:3分
文化贡献:9分