注冊(cè) | 登錄讀書(shū)好,好讀書(shū),讀好書(shū)!
讀書(shū)網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書(shū)教育/教材/教輔考試計(jì)算機(jī)考試密碼學(xué)與網(wǎng)絡(luò)安全(英文版)

密碼學(xué)與網(wǎng)絡(luò)安全(英文版)

密碼學(xué)與網(wǎng)絡(luò)安全(英文版)

定 價(jià):¥48.00

作 者: Atul Kahate 著
出版社: 清華大學(xué)出版社
叢編項(xiàng): 大學(xué)計(jì)算機(jī)教育國(guó)外著名教材系列
標(biāo) 簽: 密碼學(xué)

ISBN: 9787302099673 出版時(shí)間: 2005-01-01 包裝: 平裝
開(kāi)本: 23cm 頁(yè)數(shù): 435 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  本書(shū)清晰易懂地介紹了密碼學(xué)和網(wǎng)絡(luò)安全的基本概念和實(shí)際問(wèn)題,探討了加密、解密、對(duì)稱(chēng)和不對(duì)稱(chēng)密鑰,詳細(xì)分析和解釋了各種主要密碼算法,包括數(shù)據(jù)加密標(biāo)準(zhǔn)(DES),國(guó)際數(shù)據(jù)加密算法(IDEA),RC5,Blowfish ,先進(jìn)加密標(biāo)準(zhǔn)(AES),RSA,數(shù)字簽名算法(DSA)等,并討論了主要用于機(jī)構(gòu)的防火墻和虛擬專(zhuān)用網(wǎng)絡(luò)(VPN)技術(shù),數(shù)字證書(shū),數(shù)字簽名,公鑰基礎(chǔ)設(shè)施(PKI)和XML安全性,安全套接協(xié)議層(SSL),安全超文本傳輸協(xié)議(SHTTP),安全電子交易(SET),3D安全,PGP,PEM,S/MINE等。在無(wú)線(xiàn)安全方面研究了WAP、GSM、3G、身份認(rèn)證、單點(diǎn)登錄(SSO)等技術(shù)。本書(shū)還介紹了拒絕服務(wù)(DoS)功擊,聯(lián)機(jī)銀行交易等一些案例研究。 本書(shū)每章后面給出了多項(xiàng)選擇題、復(fù)習(xí)題、編程練習(xí)題等。本書(shū)不僅對(duì)于普及IT專(zhuān)業(yè)人員的網(wǎng)絡(luò)安全知識(shí)、提高普通用戶(hù)的安全意識(shí)大有裨益,也是本科生和研究生的一本不錯(cuò)的參考書(shū)。

作者簡(jiǎn)介

暫缺《密碼學(xué)與網(wǎng)絡(luò)安全(英文版)》作者簡(jiǎn)介

圖書(shū)目錄

1 Introduction to the Concepts of Security
1.1 Introduction 1
1.2 TheNeed forSecurity 2
1,3 Security Approaches 3
1.4 PrinciplesofSecurity 4
1.5 Types of Attacks 8
Outline of the Book 23
Multiple-choice Questions 25
Review Questions 26
Design/Programming Exercises 27
2 CryptographicTechniques
2.1 Introduction 28
2.2 Plain Text and CipherText 29
2.3 SubstitutionTechniques 31
2.4 Transposition Techniques 36
2.5 Encryption and Decryption 40
2.6 Symmetric and Asymmetric Key Cryptography 43
2.7 Steganography 53
2.8 Key Range and Key Size 54
2.9 PossibleTypesofAttacks 57
Chapter Summary 58
Key Terms and Concepts 59
Multiple-choice Questions 59
Review Questions 60
Design/Programming Exercises 61
Contents
3 Computer-based SYmmetric Key Cryptographic Algorithms
3.1 Introduction 63
3.2 Algorithm Types and Modes 63
3.3 An Overview of Symmetric Key Cryptography 73
3.4 Data Encryption Standard(DES) 75
3.5 International Data EncryptionAIgorithm (IDEA) 90
3.6 RC5 98
3.7 Blowfish 105
3.8 Advanced Encryption Standard(AES) 107
3.9 Differentialand LinearCryptanalysis 109
Chapter Summary 110
Key Terms and Concepts 110
Multiple-choice Questions 110
Review Questions 111
Design/Programming Exercises 111
4 Computer-based Asymmetric Key Cryptographic Algorithms
4.1 Introduction 112
4.2 Brief History of Asymmetric Key Cryptography 112
4.3 An Overview of Asymmetric Key Cryptography 113
4.4 The RSAAIgorithm 115
4.5 SymmetricandAsymmetric KeyCryptographyTogether 119
4.6 Digital Signatures 125
4.7 Knapsack Algorithm 154
4.8 SomeotherAIgorithms 154
Chapter Summary 157
Key Terms and Concepts 158
Multiple-choice Questions 158
Review Questions 159
Design/Programming Exercises 159
5 Public Key Infrastructure (PKI)
5.1 Introduction 161
5.2 Digital Certificates 162
5.3 Private Key Management 194
5.4 The PKIX Model 196
5.5 Public Key Cryptography Standards (PKCS) 198
5.6 XML, PKI and Security 204
Chapter Summary 208
Key Terms and Concepts 208
Multiple-choice Questions 209
Review Questions 210
Design/Programming Exercises 210
6 Internet Security Protocols
6.1 Basic Concepts 211
6.2 Secure Socket Layer(SSL) 218
6.3 Secure HyperTextTransferProtocol(SHTTP) 229
6.4 Time Stamping Protocol (TSP) 230
6.5 Secure Electronic Transaction (SET) 231
6.6 SSLVersusSET 244
6.7 3-DSecure Protocol 244
6.8 Electronic Money 245
6.9 EmailSecurity 250
6.10 WirelessApplication Protocol(WAP) Security 263
6.11 Securityin GSM 266
Chapter Summary 268
Key Terms and Concepts 269
Multiple-choice Questions 269
Review Questions 270
Design/Programming Exercises 270
7 User Authentication Mechanisms
7.1 Introduction 271
7.2 Authentication Basics 271
7.3 Passwords 272
7.4 AuthenticationTokens 286
7.5 Certificate-based Authentication 297
7.6 BiometricAuthentication 303
7.7 Kerberos 304
7.8 Single SignOn (SSO)Approaches 309
ChapterSummary 310
Key Terms and Concepts 311
Multiple-choice Questions 311
Review Questions 312
Design/Programming Exercises 312
8 Practical Implementations of Cryptography/Security
8.1 Cryptographic Solutions Using Java 314
8.2 Cryptographic Solutions Using Microsoft 322
8.3 CryptographicToolkits 324
8.4 Security and Operating Systems 325
Chapter Summary 330
Key Terms and Concepts 330
Multiple-choice Questions 330
Review Questions 331
Design/Programming Exercises 331
Contents
9 Network Security
9.1 Brief Introduction to TCP/IP 332
9.2 Firewalls 338
9.3 IP Security 349
9.4 Virtual Private Networks (VPN) 365
Chapter Summary 368
Key Terms and Concepts 368
Multiple-choice Questions 369
Review Questions 369
10 Case Studies on Cryptography and Security
10.1 Introduction 371
10.2 Cryptographic Solutions--A Case Study 371
10.3 Single SignOn (SSO) 379
10.4 Securelnter-branch Payment Transactions 382
10.5 Denial of Service (DOS)Attacks 385
10.6 IPSpoofingAttacks 388
10.7 Cross Site Scripting Vulnerability (CSSV) 389
10.8 ContractSigning 391
10.9 Secret Splitting 392
10.10 Virtual Elections 394
10.11 Secure Multiparty Calculation 395
Appendix A-Mathematical Background
Appendix B-Number Systems
Appendix C-lnformation Theory
Appendix D-Real-life Tools
Appendix E-Web Resources
Appendix F-A Brief Introduction to ASN, BER, DER
Appendix G-Modern Security Trends
Answers to Multiple-choice Questions
Glossary
References
Index

本目錄推薦

掃描二維碼
Copyright ? 讀書(shū)網(wǎng) m.ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)