信息安全专业科技英语
1星价
¥19.6
(7.0折)
2星价¥19.6
定价¥28.0
暂无评论
图文详情
- ISBN:7563513888
- 装帧:暂无
- 册数:暂无
- 重量:暂无
- 开本:23cm
- 页数:暂无
- 出版时间:2007-02-01
- 条形码:9787563513888 ; 978-7-5635-1388-8
内容简介
本书采用英文方式介绍了信息安全领域*常用的知识。从技术方面来讲主要有黑客攻击技术、密码学、防火墙技术、入侵检测技术、网络安全协议、虚拟专用网技术、计算机病毒、公钥基础设施等。除此之外还介绍了当前信息安全管理方面的一些知识。
本书适合于信息安全专业的研究生或本科生。本书一方面可以作为“信息安全专业科技英语”课的教材,另一方面也可以作为信息安全专业“信息安全概论”课的英文版教材。
目录
Chapter 1 Hacker Attack Technology
1.1 Definition and Classification of Attack
1.2 The Process or Methodology Hackers Use to Attack
1.3 The Methods and Ways of Attack
Chapter 2 Cryptography
2.1 Cryptography Introduction
2.2 Substitution Cryptography
2.3 Symmetric-key Cry6ptography
2.4 Public-key Cryptography
2.5 Cryptographic Hash Function
Chapter 3 Firewall
3.1 Introduction
3.2 Firewall Technologies
3.3 Firewall Architectures
3.4 Windows Firewall
3.5 Problems and Benefits of Firewall
Chapter 4 Intrusion Detection System
4.1 Introduction
4.2 State of the Art
4.3 Data Collection
4.4 Data Processing for Detection
4.5 Alarms, Logs and Actions
4.6 Example: Data Mining Approaches for IDS
4.7 Known Problems with IDS
Chapter 5 Network Security Protocol
5.1 Introduction
5.2 Kerberos Protocol
……
Chapter 6 Virtual Private Network
Chapter 7 Computer Virus
Chapter 8 Public-Key Infrastructure
Chapter 9 Information Security Management
参考文献
1.1 Definition and Classification of Attack
1.2 The Process or Methodology Hackers Use to Attack
1.3 The Methods and Ways of Attack
Chapter 2 Cryptography
2.1 Cryptography Introduction
2.2 Substitution Cryptography
2.3 Symmetric-key Cry6ptography
2.4 Public-key Cryptography
2.5 Cryptographic Hash Function
Chapter 3 Firewall
3.1 Introduction
3.2 Firewall Technologies
3.3 Firewall Architectures
3.4 Windows Firewall
3.5 Problems and Benefits of Firewall
Chapter 4 Intrusion Detection System
4.1 Introduction
4.2 State of the Art
4.3 Data Collection
4.4 Data Processing for Detection
4.5 Alarms, Logs and Actions
4.6 Example: Data Mining Approaches for IDS
4.7 Known Problems with IDS
Chapter 5 Network Security Protocol
5.1 Introduction
5.2 Kerberos Protocol
……
Chapter 6 Virtual Private Network
Chapter 7 Computer Virus
Chapter 8 Public-Key Infrastructure
Chapter 9 Information Security Management
参考文献
展开全部
本类五星书
本类畅销
-
地心游记(纯英文)/床头灯英语.3000词读物
¥5.7¥15.8 -
Sons and Lovers
¥8.1¥26.0 -
你往何处去
¥11.2¥33.0 -
茶花女
¥3.7¥12.0 -
小妇人(纯英文)/床头灯英语.3000词读物
¥4.7¥15.8 -
了不起的盖茨比(纯英文)/床头灯英语.3000词读物
¥4.2¥12.8 -
流浪地球刘慈欣
¥16.7¥62.0 -
方法论
¥3.3¥9.5 -
本杰明:富兰克林自传
¥4.2¥13.5 -
企鹅口袋书系列·伟大的思想20:论自然选择(英汉双语)
¥6.3¥14.0 -
城堡
¥12.0¥26.0 -
巴黎圣母院
¥4.7¥15.5 -
命案目睹记
¥14.5¥33.8 -
THE GREAT GATSBY-了不起的盖茨比
¥5.0¥16.8 -
最新英汉百科图解词典-升级版
¥131.0¥168.0 -
沉思录
¥9.7¥21.0 -
英诗选译-孙大雨译文集-(英汉对照)
¥14.0¥36.0 -
考研英语背单词20个词根词缀
¥1.2¥3.2 -
英文疑难详解续篇
¥30.6¥45.0 -
查拉图斯特拉加是说
¥10.2¥29.0