{{sellerTotalView > 1 ? __("sellers", {number: sellerTotalView}) : __("seller", {number: sellerTotalView}) }}, {{numTotalView > 1 ? __("items", {number: numTotalView}) : __("item", {number: numTotalView}) }}
免運費
Yami

Nickname

請告訴我們怎麼更好地稱呼你

更新你的名字
賬戶 訂單 收藏
{{ inviteNavTitle }}
退出登入

切換配送區域

不同區域的庫存和配送時效可能存在差異。

歷史郵編

{{email ? __('Got it!') : __('Restock Alert')}}

我們將在商品到貨後第一時間通知你。

取消
Yami

京東圖書

大学计算机教育国外著名教材系列·网络安全基础:应用与标准(第4版)

{{buttonTypePin == 3 ? __("Scan to view more PinGo") : __("Scan to start")}}

大学计算机教育国外著名教材系列·网络安全基础:应用与标准(第4版)

{{__(":people-members", {'people': item.limit_people_count})}} {{ itemCurrency }}{{ item.valid_price }} {{ itemCurrency }}{{ item.invalid_price }} {{ itemDiscount }}
後結束
{{ itemCurrency }}{{ item.valid_price }}
{{ itemCurrency }}{{ priceFormat(item.valid_price / item.bundle_specification) }}/{{ item.unit }}
{{ itemDiscount }}
{{ itemCurrency }}{{ item.valid_price }} {{ itemCurrency }}{{ priceFormat(item.valid_price / item.bundle_specification) }}/{{ item.unit }} {{ itemCurrency }}{{ item.invalid_price }} {{itemDiscount}}
{{ itemCurrency }}{{ item.valid_price }}
後結束促銷
後開始秒殺 後結束秒殺
{{ getSeckillDesc(item.seckill_data) }}
{{ __( "Pay with Gift Card to get sale price: :itemCurrency:price", { 'itemCurrency' : itemCurrency, 'price' : (item.giftcard_price ? priceFormat(item.giftcard_price) : '0.00') } ) }} ({{ itemCurrency }}{{ priceFormat(item.giftcard_price / item.bundle_specification) }}/{{ item.unit }}) 詳情
商品有效期

已下架

我們不知道該商品何時或是否會重新有庫存。

當前地址無法配送
已售完

商品描述

展開全部描述
Content Description

《网络安全基础:应用与标准(第4版)(影印版)》由著名作者William Stallillgs编写,以当今网络安全的实际解决方案为基础,既简明扼要,又全面系统地介绍了网络安全的主要内容,包括基本原理、重要技术、主要方法和重要的工业标准等。全书共包含11章。除第1章引言外,其余各章分为三大部分叙述:第一部分是密码学,重点介绍分组密码、流密码、消息认证码、安全杂凑函数、公钥密码和数字签名等的基本原理、主要方法和重要应用场景等,并简要介绍了几种常用的典型算法,包括DES算法、AES算法、RC4算法和RSA算法等;第二部分是网络安全应用,简要介绍了传输层安全中的SSL/TLS协议、无线局域网安全及WAP协议、电子邮件安全与PGP与S/MIME协议;IP层安全与IPsec协议等。第三部分是系统安全,简要介绍了入侵检测与口令管理、恶意软件与防火墙等。
《网络安全基础:应用与标准(第4版)(影印版)》以最新和实用的网络安全知识为主题,采用深入浅出的叙述手法,每章末尾还给出一定的推荐读物和思考练习题。因此,《网络安全基础:应用与标准(第4版)(影印版)》既是高等学校网络安全基础课程的好教材,也是工程技术人员和网络爱好者了解网络安全基本概貌的好读物。
Catalogue

Preface ix
About the Author xiv
Chapter 1 Introduction 1
1.1 Computer Security Concepts 3
1.2 The OSI Security Architecture 8
1.3 Security Attacks 9
1.4 Security Services 13
1.5 Security Mechanisms 16
1.6 A Model for Network Security 19
1.7 Standards 21
1.8 Outline of This Book 21
1.9 Recommended Reading 22
1.10 Internet and Web Resources 23
1.11 Key Terms, Review Questions, and Problems 25

PART ONE CRYPTOGRAPHY 27
Chapter 2 Symmetric Encryption and Message Confidentiality 27
2.1 Symmetric Encryption Principles 28
2.2 Symmetric Block Encryption Algorithms 34
2.3 Random and Pseudorandom Numbers 42
2.4 Stream Ciphers and RC4 45
2.5 Cipher Block Modes of Operation 50
2.6 Recommended Reading andWeb Sites 55
2.7 Key Terms, Review Questions, and Problems 56

Chapter 3 Public-Key Cryptography and Message Authentication 61
3.1 Approaches to Message Authentication 62
3.2 Secure Hash Functions 67
3.3 Message Authentication Codes 73
3.4 Public-Key Cryptography Principles 79
3.5 Public-Key Cryptography Algorithms 83
3.6 Digital Signatures 90
3.7 Recommended Reading and Web Sites 90
3.8 Key Terms, Review Questions, and Problems 91

PART TWO NETWORK SECURITY APPLICATIONS 97
Chapter 4 Key Distribution and User Authentication 97
4.1 Symmetric Key Distribution Using Symmetric Encryption 98
4.2 Kerberos 99
4.3 Key Distribution Using Asymmetric Encryption 114
4.4 X.509 Certificates 116
4.5 Public-Key Infrastructure 124
4.6 Federated Identity Management 126
4.7 Recommended Reading and Web Sites 132
4.8 Key Terms, Review Questions, and Problems 133

Chapter 5 Transport-Level Security 139
5.1 Web Security Considerations 140
5.2 Secure Socket Layer and Transport Layer Security 143
5.3 Transport Layer Security 156
5.4 HTTPS 160
5.5 Secure Shell (SSH) 162
5.6 Recommended Reading and Web Sites 173
5.7 KeyTerms, Review Questions, and Problems 173

Chapter 6 Wireless Network Security 175
6.1 IEEE 802.11 Wireless LAN Overview 177
6.2 IEEE 802.11i Wireless LAN Security 183
6.3 Wireless Application Protocol Overview 197
6.4 Wireless Transport Layer Security 204
6.5 WAP End-to-End Security 214
6.6 Recommended Reading andWeb Sites 217
6.7 Key Terms, Review Questions, and Problems 218

Chapter 7 Electronic Mail Security 221
7.1 Pretty Good Privacy 222
7.2 S/MIME 241
7.3 DomainKeys Identified Mail 257
7.4 Recommended Reading and Web Sites 264
7.5 Key Terms, Review Questions, and Problems 265
Appendix 7A Radix-64 Conversion 266

Chapter 8 IP Security 269
8.1 IP Security Overview 270
8.2 IP Security Policy 276
8.3 Encapsulating Security Payload 281
8.4 Combining Security Associations 288
8.5 Internet Key Exchange 292
8.6 Cryptographic Suites 301
8.7 Recommended Reading and Web Sites 302
8.8 Key Terms, Review Questions, and Problems 303

PART THREE SYSTEM SECURITY 305
Chapter 9 Intruders 305
9.1 Intruders 307
9.2 Intrusion Detection 312
9.3 Password Management 323
9.4 Recommended Reading and Web Sites 333
9.5 Key Terms, Review Questions, and Problems 334
Appendix 9A The Base-Rate Fallacy 337

Chapter 10 Malicious Software 340
10.1 Types of Malicious Software 341
10.2 Viruses 346
10.3 Virus Countermeasures 351
10.4 Worms 356
10.5 Distributed Denial of Service Attacks 365
10.6 Recommended Reading and Web Sites 370
10.7 Key Terms, Review Questions, and Problems 371

Chapter 11 Firewalls 374
11.1 The Need for Firewalls 375
11.2 Firewall Characteristics 376
11.3 Types of Firewalls 378
11.4 Firewall Basing 385
11.5 FirewaU Location and Configurations 388
11.6 Recommended Reading and Web Site 393
11.7 Key Terms, Review Questions, and Problems 394

APPENDICES 398
Appendix ASome Aspects of Number Theory 398
A.1 Prime and Relatively Prime Numbers 399
A.2 Modular Arithmetic 401
Appendix BProjects for Teaching Network Security 403
B.1 Research Projects 404
B.2 Hacking Project 405
B.3 Programming Projects 405
B.4 Laboratory Exercises 406
B.5 Practical Security Assessments 406
B.6 Writing Assignments 406
B.7 Reading/Report Assignments 407
Index 408
ONLINE CHAPTERS

Chapter 12 Network Management Security
12.1 Basic Concepts of SNMP
12.2 SNMPvl Community Facility
12.3 SNMPv3
12.4 Recommended Reading and Web Sites
12.5 Key Terms, Review Questions, and Problems

Chapter 13 Legal and Ethical Aspects
13.1 Cybercrime and Computer Crime
13.2 Intellectual Property
13.3 Privacy
13.4 Ethical Issues
13.5 Recommended Reading and Web Sites
13.6 Key Terms, Review Questions, and Problems
ONLINE APPENDICES
Appendix CStandards and Standards-Setting Organizations
C.1 The Importance of Standards
C.2 Internet Standards and the Internet Society
C.3 National Institute of Standards and Technology
Appendix D TCP/IP and OSI
D.1 Protocols and Protocol Architectures
D.2 The TCP/IP Protocol Architecture
D.3 The Role of an Internet Protocol
D.4 IPv4
D.5 IPv6
D.6 The OSI Protocol Architecture
Appendix E Pseudorandom Number Generation
E.1 PRNG Requirements
E.2 PRNG Using a Block Cipher
E.3 PRNG Using a Hash Function or Message Authentication Code
Appendix F Kerberos Encryption Techniques
E 1Password-to-Key Transformation
E2Propagating Cipher Block Chaining Mode
Appendix G Data Compression Using ZIP
G.1 Compression Algorithm
G.2 Decompression Algorithm
Appendix H PGP Random Number Generation
H.1 True Random Numbers
H.2 Pseudorandom Numbers
Appendix I The International Reference Alphabet
Glossary
References
Book Abstract

3DES has two attractions that assure its widespread use over the next few years. First, with its 168-bit key length, it overcomes the vulnerability to brute-force attack of DEA. Second, the underlying encryption algorithm in 3DES is the same as in DEA. This algorithm has been subjected to more scrutiny than any other encryption algorithm over a longer period of time, and no effective cryptanalytic attack based on the algorithm rather than brute force has been found. Accordingly, there is a high level of confidence that 3DES is very resistant to cryptanalysis. If security were the only consideration, then 3DES would be an appropriate choice for a standardized encryption algorithm for decades to come.
The principal drawback of 3DES is that the algorithm is relatively sluggish in software. The original DEA was designed for mid-1970s hardware implementation and does not produce efficient software code. 3DES, which has three times as many rounds as DEA, is correspondingly slower. A secondary drawback is that both DEA and 3DES use a 64-bit block size. For reasons of both efficiency and security, a larger lock size is desirable.
Because of these drawbacks, 3DES is not a reasonable candidate for long-term se. As a replacement, NIST in 1997 issued a call for proposals for a new Advanced ncryption Standard (AES), which should have a security strength equal to or better han 3DES and significantly improved efficiency. In addition to these general equirements, NIST specified that AES must be a symmetric block cipher with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. Evaluation criteria included security, computational efficiency, memory requirements, hardware and software suitability, and flexibility.
Introduction

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.
It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards (especially Internet standards) that have been widely deployed. This book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. It covers the material in IAS2 Security Mechanisms, a core area in the Information Technology body of knowledge; and NET4 Security, another core area in the Information Technology body of knowledge. These subject areas are part of the Draft ACM/IEEE Computer Society Computing Curricula 2005.

規格參數

品牌 京東圖書
品牌屬地 China

免責聲明

產品價格、包裝、規格等資訊如有調整,恕不另行通知。我們盡量做到及時更新產品資訊,但請以收到實物為準。使用產品前,請始終閱讀產品隨附的標籤、警告及說明。

查看詳情
加入收藏
{{ $isZh ? coupon.coupon_name_sub : coupon.coupon_ename_sub | formatCurrency }}
{{__("Buy Directly")}} {{ itemCurrency }}{{ item.directly_price }}
數量
{{ quantity }}
{{ instockMsg }}
{{ limitText }}
{{buttonTypePin == 3 ? __("Scan to view more PinGo") : __("Scan to start")}}
由 JD@CHINA 銷售
送至
{{ __("Ship to United States only") }}
滿69免運費
正品保證

已加入購物車

繼續逛逛

為你推薦

{{ item.brand_name }}

{{ item.item_name }}

{{ item.currency }}{{ item.market_price }}

{{ item.currency }}{{ item.unit_price }}

{{ item.currency }}{{ item.unit_price }}

優惠券

{{ coupon.coupon_name_new | formatCurrency }}
領取 已領取 已領完
{{ getCouponDescStr(coupon) }}
{{ coupon.use_time_desc }}
即將過期: {{ formatTime(coupon.use_end_time) }}

分享給好友

取消

亞米禮卡專享價

使用禮卡支付即可獲得禮卡專享價

規則說明

禮卡專享價是部分商品擁有的特殊優惠價格;

購買禮卡專享價商品時,若在結算時使用電子禮卡抵扣支付,且禮卡餘額足夠支付訂單中所有禮卡專享價商品的專享價總和,則可以啟用禮卡專享價;

不使用禮卡支付,或禮卡餘額不滿足上一條所述要求時,將無法啟用禮卡專享價,按照普通售價計算,但您仍然可以購買這些商品;

在購買禮卡專享價商品時,若餘額不足,可以在購物車或結算頁中點擊“充值”按鈕對禮卡進行購買和充值;

商品若擁有禮卡專享價,會顯示“專享”的特殊價格標記;

如有疑問,請隨時聯繫客服;

禮卡專享價相關規則最終解釋權歸亞米所有。

由 亞米 銷售

服務保障

Yami 滿$49免運費
Yami 無憂退換
Yami 從美國出貨

配送資訊

  • 美國

    標準配送 $5.99(不含阿拉斯加,夏威夷),最終價滿$49免運費

    本地配送$5.99(加州,紐約州,新澤西,麻省和賓夕法尼亞,以上州部分地區);最終價滿$49免運費

    兩日達(含阿拉斯加夏威夷)運費19.99美元起

退換政策

亞米網希望為我們的客戶提供最優秀的售後服務,讓所有人都能放心在亞米購物。亞米自營商品在滿足退換貨條件的情況下,可在收到包裹的30天之內退換商品(食品因商品質量問題7天內可退換;為了確保每位客戶都能獲得安全和高質量的商品,對於美妝類產品,一經開封或使用即不提供退款或退貨服務,質量問題除外;其他特殊商品需聯繫客服諮詢)。
感謝您的理解和支持。

查看詳情

由 亞米 銷售

亞米電子禮品卡使用規則

若購買時選擇自動儲值,訂單完成後禮品卡將自動儲值至您的帳戶;

若購買時選擇發送郵件,訂單完成後系統將自動發送卡號和密碼到您填寫的郵箱;

寄送郵件時,任何使用者均可使用郵件中的卡號密碼進行禮卡儲值,請妥善保管郵件資訊。

如接收郵件遇到問題,請聯絡客服處理;

發送郵件時,若禮卡沒有被兌換,可以補發郵件。若已經被其他用戶兌換,無法補償;

亞米網電子禮卡可用於購買自營或第三方商品;

亞米網電子禮卡沒有有效期限限制,長期有效;

亞米網電子禮卡的金額,可分多次使用;

亞米網電子禮卡業務規則,最終解釋權歸亞米網所有。

退換政策

已消費的電子禮卡不支持退款。

JD@CHINA 銷售

服務保障

Yami 滿$49免運費
Yami 最優售後
Yami 美國本土出貨

配送資訊

  • 美國

    標準配送 $5.99(不含阿拉斯加,夏威夷),最終價滿$49免運費

    本地配送$5.99(加州,紐約州,新澤西,麻省和賓夕法尼亞,以上州部分地區);最終價滿$49免運費

    兩日達(含阿拉斯加夏威夷)運費19.99美元起

退換政策

提供30天內退還保障。產品需全新未使用原包裝內,並附有購買憑證。產品品質問題、或錯發漏發等,由商家造成的失誤,將進行補發,或退款處理。其它原因需退貨費用由客戶自行承擔。

由 JD@CHINA 銷售

服務保障

Yami 跨店滿$69免運費
Yami 30天退換保障

亞米-中國集運倉

由亞米從中國精選並集合各大優秀店舖的商品至亞米中國整合中心,合併包裹後將一次合包跨國郵寄至您的地址。跨店包郵門檻低至$69。您將在多商家集合提供的廣泛選購商品中選購商品,輕鬆享有跨店鋪包郵後的低郵資。

退換政策

提供30天內退換保障。產品需在全新未使用的原包裝內,並附有購買憑證。產品品質問題、錯發、或漏發等商家造成的失誤,將進行退款處理。其它原因造成的退換貨郵費客戶將需要自行承擔。由於所有商品均長途跋涉,偶有簡易外包壓磨等但不涉及內部品質問題者,不予退換。

配送資訊

亞米中國集運 Consolidated Shipping 運費$9.99(訂單滿$69 包郵)

下單後2個工作天中國商家出貨,所有包裹抵達亞米中國整合中心(除特別情況及中國境內個別法定假日外)會合併包裹後透過UPS發往美國。 UPS從中國出貨後到美國境內的平均時間為10個工作天左右,可隨時根據直發單號追蹤查詢。受疫情影響,目前物流可能延遲5天左右。包裹需要客人簽收。如未簽收,客人須承擔包裹遺失風險。

由 JD@CHINA 銷售

服務保障

滿69免運費
正品保證

配送資訊

Yami Consolidated Shipping 運費$9.99(訂單滿$69包郵)


Seller will ship the orders within 1-2 business days. The logistics time limit is expected to be 7-15 working days. In case of customs clearance, the delivery time will be extended by 3-7 days. The final receipt date is subject to the information of the postal company.

積分規則

不參加任何折扣活動以及亞米會員積分制度。

退換政策

提供30天內退還保障。產品需全新未使用原包裝內,並附有購買憑證。產品品質問題、或錯發漏發等,由商家造成的失誤,將進行補發,或退款處理。其它原因需退貨費用由客戶自行承擔。

Yami

下載亞米應用

返回頂部

為您推薦

品牌故事

京東圖書

为您推荐

Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折

評論{{'('+ commentList.posts_count + ')'}}

分享您的感受,幫助更多用戶做出選擇。

撰寫評論
{{ totalRating }} 撰寫評論
  • {{i}}星

    {{i}} 星

    {{ parseInt(commentRatingList[i]) }}%

Yami Yami
{{ comment.user_name }}

{{ showTranslate(comment) }}收起

{{ strLimit(comment,800) }}查看全部

Show Original

{{ comment.content }}

Yami
查看更多

{{ formatTime(comment.in_dtm) }} 已購買 {{groupData}}

{{ comment.likes_count }} {{ comment.likes_count }} {{ comment.reply_count }} {{comment.in_user==uid ? __('Delete') : __('Report')}}
Yami Yami
{{ comment.user_name }}

{{ showTranslate(comment) }}收起

{{ strLimit(comment,800) }}查看全部

Show Original

{{ comment.content }}

Yami
查看更多

{{ formatTime(comment.in_dtm) }} 已購買 {{groupData}}

{{ comment.likes_count }} {{ comment.likes_count }} {{ comment.reply_count }} {{comment.in_user==uid ? __('Delete') : __('Report')}}

暫無符合條件的評論~

評論詳情

Yami Yami

{{ showTranslate(commentDetails) }}收起

{{ strLimit(commentDetails,800) }}查看全部

Show Original

{{ commentDetails.content }}

Yami
查看更多

{{ formatTime(commentDetails.in_dtm) }} 已購買 {{groupData}}

{{ commentDetails.likes_count }} {{ commentDetails.likes_count }} {{ commentDetails.reply_count }} {{commentDetails.in_user==uid ? __('Delete') : __('Report')}}

請輸入內容

回覆{{'(' + replyList.length + ')'}}

Yami Yami

{{ showTranslate(reply) }}收起

{{ strLimit(reply,800) }}查看全部

Show Original

{{ reply.reply_content }}

{{ formatTime(reply.reply_in_dtm) }}

{{ reply.reply_likes_count }} {{ reply.reply_likes_count }} {{ reply.reply_reply_count }} {{reply.reply_in_user==uid ? __('Delete') : __('Report')}}

請輸入內容

取消

這是到目前為止的所有評論!

發表評論
商品評分

請輸入評論

  • 一個好的暱稱,會讓你的評論更受歡迎!
  • 修改了這裡的暱稱,個人資料中的暱稱也將被修改。
感謝你的評論
你的好評可以幫助我們的社區發現更好的亞洲商品。

舉報

取消

確認刪除該評論嗎?

取消

歷史瀏覽

品牌故事

京東圖書