
包邮信息安全专业科技英语
1星价
¥19.6
(7.0折)
2星价¥19.6
定价¥28.0

暂无评论
图文详情
- ISBN:7563513888
- 装帧:暂无
- 册数:暂无
- 重量:暂无
- 开本:23cm
- 页数:暂无
- 出版时间:2007-02-01
- 条形码:9787563513888 ; 978-7-5635-1388-8
内容简介
本书采用英文方式介绍了信息安全领域*常用的知识。从技术方面来讲主要有黑客攻击技术、密码学、防火墙技术、入侵检测技术、网络安全协议、虚拟专用网技术、计算机病毒、公钥基础设施等。除此之外还介绍了当前信息安全管理方面的一些知识。
本书适合于信息安全专业的研究生或本科生。本书一方面可以作为“信息安全专业科技英语”课的教材,另一方面也可以作为信息安全专业“信息安全概论”课的英文版教材。
目录
Chapter 1 Hacker Attack Technology
1.1 Definition and Classification of Attack
1.2 The Process or Methodology Hackers Use to Attack
1.3 The Methods and Ways of Attack
Chapter 2 Cryptography
2.1 Cryptography Introduction
2.2 Substitution Cryptography
2.3 Symmetric-key Cry6ptography
2.4 Public-key Cryptography
2.5 Cryptographic Hash Function
Chapter 3 Firewall
3.1 Introduction
3.2 Firewall Technologies
3.3 Firewall Architectures
3.4 Windows Firewall
3.5 Problems and Benefits of Firewall
Chapter 4 Intrusion Detection System
4.1 Introduction
4.2 State of the Art
4.3 Data Collection
4.4 Data Processing for Detection
4.5 Alarms, Logs and Actions
4.6 Example: Data Mining Approaches for IDS
4.7 Known Problems with IDS
Chapter 5 Network Security Protocol
5.1 Introduction
5.2 Kerberos Protocol
……
Chapter 6 Virtual Private Network
Chapter 7 Computer Virus
Chapter 8 Public-Key Infrastructure
Chapter 9 Information Security Management
参考文献
1.1 Definition and Classification of Attack
1.2 The Process or Methodology Hackers Use to Attack
1.3 The Methods and Ways of Attack
Chapter 2 Cryptography
2.1 Cryptography Introduction
2.2 Substitution Cryptography
2.3 Symmetric-key Cry6ptography
2.4 Public-key Cryptography
2.5 Cryptographic Hash Function
Chapter 3 Firewall
3.1 Introduction
3.2 Firewall Technologies
3.3 Firewall Architectures
3.4 Windows Firewall
3.5 Problems and Benefits of Firewall
Chapter 4 Intrusion Detection System
4.1 Introduction
4.2 State of the Art
4.3 Data Collection
4.4 Data Processing for Detection
4.5 Alarms, Logs and Actions
4.6 Example: Data Mining Approaches for IDS
4.7 Known Problems with IDS
Chapter 5 Network Security Protocol
5.1 Introduction
5.2 Kerberos Protocol
……
Chapter 6 Virtual Private Network
Chapter 7 Computer Virus
Chapter 8 Public-Key Infrastructure
Chapter 9 Information Security Management
参考文献
展开全部
本类五星书
浏览历史
本类畅销
-
了不起的盖茨比(纯英文)/床头灯英语.3000词读物
¥5.5¥12.8 -
THE LITTLE PRINCE-小王子
¥6.9¥19.8 -
茶花女
¥5.2¥12.0 -
地心游记(纯英文)/床头灯英语.3000词读物
¥8.7¥15.8 -
安徒生童话精选
¥14.6¥40.0 -
MADAME BOVARY-包法利夫人
¥13.3¥36.8 -
考研英语背单词20个词根词缀
¥2.2¥3.2 -
视听说教程2学生用书
¥17.6¥45.0 -
命案目睹记
¥13.2¥33.8 -
理想丈夫
¥11.1¥28.0 -
我有所念人,隔在远远乡
¥22.4¥49.8 -
浮生六记(汉英对照)
¥18.6¥65.0 -
小妇人(纯英文)/床头灯英语.3000词读物
¥6.4¥15.8 -
赖世雄美语音标(美语从头学)
¥16.5¥25.0 -
名著名译英汉对照读本马克.吐温短篇小说选
¥15.4¥28.0 -
双语名著无障碍阅读丛书:天方夜谭(英汉对照 第一级)
¥7.8¥25.0 -
了不起的盖茨比:经典全译本
¥8.5¥25.0 -
英语学习-大家小书
¥14.7¥36.0 -
朗文经典-文学名著英汉双语读物-第七级(全5册)-适合高一.高二
¥25.8¥86.0 -
企鹅口袋书系列·伟大的思想20:论自然选择(英汉双语)
¥10.1¥14.0