-
>
全國計算機等級考試最新真考題庫模擬考場及詳解·二級MSOffice高級應用
-
>
決戰行測5000題(言語理解與表達)
-
>
軟件性能測試.分析與調優實踐之路
-
>
第一行代碼Android
-
>
JAVA持續交付
-
>
EXCEL最強教科書(完全版)(全彩印刷)
-
>
深度學習
信息安全原理與應用-(第四版)(英文版) 版權信息
- ISBN:9787121047442
- 條形碼:9787121047442 ; 978-7-121-04744-2
- 裝幀:暫無
- 冊數:暫無
- 重量:暫無
- 所屬分類:>
信息安全原理與應用-(第四版)(英文版) 本書特色
本書是一本信息安全的經典著作和權威指南,內容新穎豐富。全書系統地描述了計算安全的各方面問題,內容涉及計算機安全的概念和術語;密碼學基礎及應用;程序及軟件安全;操作系統安全及可信任操作系統的設計;數據庫及數據挖掘的安全;網絡安全;安全管理;計算機安全經濟學;計算安全中的隱私問題;計算安全中的法律和道德問題,*后是對密碼學的深入研究。
本書既可以作為信息安全或計算機專業本科生、研究生的雙語教材,也可以作為相關領域研究人員和專業技術人員的參考用書。
信息安全原理與應用-(第四版)(英文版) 內容簡介
Chapter 1 Is There a Security Problem in Computing?
1.1 What Does "Secure" Mean?
Protecting Valuables
Characteristics of Computer Intrusion
1.2 Attacks
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 What''s Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
2.1 Terminology and Background
Terminology
Representing Characters
2.2 Substitution Ciphers
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3 Transpositions (Permutations)
Columnar Transpositions
Combinations of Approaches
2.4 Making "Good" Encryption Algorithms
What Makes a "Secure" Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanaly$is--Breaking Encryption Schemes
2.5 The Data Encryption Standard
Background and History
Overview of the DES Algorithm
Double and Triple DES
Security of the DES
2.6 The AES Encryption Algorithm
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of DES and AES
2.7 Public Key Encryption
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained
Bibliography
Index
信息安全原理與應用-(第四版)(英文版) 目錄
1.1 What Does"Secure"Mean?
protecting Valuables
Characteristics of Computer lntrusion
1.2 Attacks
Vulnerabilities,Threats,Attacks,and Controls
Method,Opportunity,and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 What's Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption ln-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field ls Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical lssues in Computer Security
Chapter 12 Cryptography Explained
Bibliography
- >
二體千字文
- >
史學評論
- >
【精裝繪本】畫給孩子的中國神話
- >
中國人在烏蘇里邊疆區:歷史與人類學概述
- >
名家帶你讀魯迅:朝花夕拾
- >
莉莉和章魚
- >
月亮與六便士
- >
我與地壇