中图网文创礼盒,买2个减5元
欢迎光临中图网 请 | 注册
> >
信息安全原理与应用-(第四版)(英文版)

信息安全原理与应用-(第四版)(英文版)

作者:佛莱格
出版社:电子工业出版社出版时间:2007-08-01
开本: 16开
中 图 价:¥62.4(7.9折) 定价  ¥79.0 登录后可看到会员价
暂时缺货 收藏
运费6元,满69元免运费
?快递不能达地区使用邮政小包,运费14元起
云南、广西、海南、新疆、青海、西藏六省,部分地区快递不可达
本类五星书更多>

信息安全原理与应用-(第四版)(英文版) 版权信息

  • ISBN:9787121047442
  • 条形码:9787121047442 ; 978-7-121-04744-2
  • 装帧:暂无
  • 册数:暂无
  • 重量:暂无
  • 所属分类:>

信息安全原理与应用-(第四版)(英文版) 本书特色

本书是一本信息安全的经典著作和权威指南,内容新颖丰富。全书系统地描述了计算安全的各方面问题,内容涉及计算机安全的概念和术语;密码学基础及应用;程序及软件安全;操作系统安全及可信任操作系统的设计;数据库及数据挖掘的安全;网络安全;安全管理;计算机安全经济学;计算安全中的隐私问题;计算安全中的法律和道德问题,*后是对密码学的深入研究。

本书既可以作为信息安全或计算机专业本科生、研究生的双语教材,也可以作为相关领域研究人员和专业技术人员的参考用书。

信息安全原理与应用-(第四版)(英文版) 内容简介

Chapter 1  Is There a Security Problem in Computing?
 1.1 What Does "Secure" Mean?
  Protecting Valuables
  Characteristics of Computer Intrusion
 1.2 Attacks
  Vulnerabilities, Threats, Attacks, and Controls
  Method, Opportunity, and Motive
 1.3 The Meaning of Computer Security
  Security Goals
  Vulnerabilities
 1.4 Computer Criminals
  Amateurs
  Crackers or Malicious Hackers
  Career Criminals
  Terrorists
 1.5 Methods of Defense
  Controls
  Effectiveness of Controls
 1.6 What''s Next
  Encryption Overview
  Hardware and Software Security
  Human Controls in Security
  Encryption In-Depth
 1.7 Summary
 1.8 Terms and Concepts
 1.9 Where the Field Is Headed
 1.10 To Learn More
 1.11 Exercises
Chapter 2 Elementary Cryptography
 2.1 Terminology and Background
  Terminology
  Representing Characters
 2.2 Substitution Ciphers
  The Caesar Cipher
  Other Substitutions
  One-Time Pads
  Summary of Substitutions
 2.3 Transpositions (Permutations)
  Columnar Transpositions
  Combinations of Approaches
 2.4 Making "Good" Encryption Algorithms
  What Makes a "Secure" Encryption Algorithm?
  Symmetric and Asymmetric Encryption Systems
  Stream and Block Ciphers
  Confusion and Diffusion
  Cryptanaly$is--Breaking Encryption Schemes
 2.5 The Data Encryption Standard
  Background and History
  Overview of the DES Algorithm
  Double and Triple DES
  Security of the DES
 2.6 The AES Encryption Algorithm
  The AES Contest
  Overview of Rijndael
  Strength of the Algorithm
  Comparison of DES and AES
 2.7 Public Key Encryption
  Motivation
  Characteristics
  Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained
Bibliography
Index

信息安全原理与应用-(第四版)(英文版) 目录

Chapter 1 Is Thera a Security Problem in Computing?
1.1 What Does"Secure"Mean?
protecting Valuables
Characteristics of Computer lntrusion
1.2 Attacks
Vulnerabilities,Threats,Attacks,and Controls
Method,Opportunity,and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 What's Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption ln-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field ls Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical lssues in Computer Security
Chapter 12 Cryptography Explained
Bibliography
展开全部
商品评论(0条)
暂无评论……
书友推荐
编辑推荐
返回顶部
中图网
在线客服