Foto dell'editore

Computer network security technology (Network Professional Vocational planning materials)(Chinese Edition)


ISBN 10: 7561138563 / ISBN 13: 9787561138564
Nuovi / paperback / Quantitą: 10
Da liu xing (JiangSu, JS, Cina)
Copie del libro da altre librerie
Mostra tutte le  copie di questo libro
Aggiungere al carrello
Prezzo consigliato:
Prezzo: EUR 53,08
Convertire valuta
Spedizione: EUR 9,20
Da: Cina a: U.S.A.
Destinazione, tempi e costi

Lista dei preferiti


Dati bibliografici

Titolo: Computer network security technology (...

Legatura: paperback

Condizione libro: New


Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 264 Publisher: Dalian University of Technology Pub. Date :2008-02-01 version 1. Contents: Chapter 1 Overview of Network Security 1.1 Network Security 1.2 Network definition of security events Glance 1.2.1 The origins of network security events 1.2 .2 Network - 1.2.3 new ways to steal money from the network - to vent their emotions the way network security situation is grim 1.3 China 1.4 Overview of Network Security Summary Chapter 2 Network Security Architecture Network Security 2.1 Basic Concepts 2.2 Network Security Architecture Framework 2.3 Network Security System features 2.4OSI Reference Model Chapter 3 of the safety of the structure and security of network data packets 3.1 packet-switched and packet structure 3.1.1 What is a packet-switched and packet 3.1.2 the information transfer process and the structure of the data packet 3.1.3 Learning Network protocols in network security in the sense of 3.2 packet capture and analysis 3.2.1 Principle 3.2.2 packet capture data capture method 3.2.3Sniffer Portable 3.2.4 software introduces data capture and data filtering 3.3 analysis using Sniffer Portable 3.3.2 3.3.1TCPIP protocol analysis of network protocols 3.3.3 Network layer protocol header structure 3.3.4 Transport Protocol header structure 3.4 data security 3.4.1 3.4.2 security risk to improve network security. to prevent network Chapter 4 sniffer measures 4.1 data encryption data encryption encryption technology overview 4.1.1 4.1.2 The origin and development of the basic concepts of cryptography password 4.1.3 Classification 4.2 instead of the traditional password system password 4.2.2 4.2.1 once a shift key password Password 4.2.3 4.3 4.3.1 Modern Cryptography 4.3.2 Symmetric cryptography 4.4 hybrid asymmetric cryptography encryption method 4.5Internet data encryption technology commonly used in Chapter 5 5.1 Key Management Key Management the contents of the key organizational structure 5.1.2 5.1.1 key generation key storage and protection 5.1.4 5.1.3 key update 5.1.5 key distribution 5.1.6 key authentication 5.1.7 key use 5.1. 8 Key Backup 5.1.9 key destroyed 5.2 5.2.1 Key Distribution Center key distribution method 5.2.2Diffie-Hellman cryptographic key exchange method 5.2.3 5.2.4 5.3 enhanced key negotiation method of global public 5.3.2 Management 5.3.1 the use of public key signature key and public key encryption key generation 5.3.3 5.3.4 5.3.5 public access to key backup and recovery 5.3.6 X.509-based PKI certificate Chapter 6. data integrity protection 6.1 Information Technology 6.1.1 Summary of the basic principles of 6.1.2MD5 algorithm Secure Hash Standard 6.1.4HMAC6.2 6.1.3 Digital Signatures 6.2.2 6.2.1 The concept of digital signatures based on public-key cryptosystem 6.2.3 Digital Signature private key cryptosystem based on the digital signature Digital Signature Standard DSS 6.2.4 Chapter 7 of authentication technologies 7.1 Overview 7.1.1 Entity authentication and identification of data sources made one-way hash function identification 7.2 Identification 7.1.2 mechanism for non-password authentication mechanism 7.2.1 7.2.2 symmetrical password authentication mechanism using public-key cryptosystem 7.2.3 Identification of mechanisms 7.3Kerberos system 7.3.1Kerberos certification program 7.3.2Kerloems limitations 7.4GSSAPIv27.4.1 single TGT The Kerberos7.4.2 double the Kerberos TGT Chapter 8 8.1 Access Control and Firewall Access Control 8.2 The basic principle of common operating system access control 8.2.1Windows 2000 8.2.2Linux in the access control access control 8.3.1 Firewall 8.3 firewall technology The concept of firewall technology classification 8.3.3 8.3.2 The main technical parameters Firewall 8.3.4 Firewall basic architecture 8.3.5 8.3.6 firewall settings firewall deployment case 8.3.7Linux Kernel Firewall Chapter 9 9.1 computer viruses and computer defense The concept of virus co. Codice inventario libreria LQ4969

Info su libreria e pagamento

Metodi di pagamento

La libreria accetta i seguenti metodi di pagamento:

  • American Express
  • Bonifico bancario
  • Carte Bleue
  • Mastercard
  • PayPal
  • Visa

[Cercare nel catalogo della libreria]

[Tutti i libri della libreria]

[Fare una domanda alla libreria]

Libreria: liu xing
Indirizzo: JiangSu, JS, Cina

Libreria AbeBooks dal: 7 aprile 2009
Valutazione libreria: 5 stelle

Condizioni di vendita:

We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...

[Ulteriori informazioni]

Condizioni di spedizione:

Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.

Descrizione libreria: Thank you for visiting My bookstore! We are an online bookstore, and Is the China's largest online book sales. Generally our books are from China, with reasonable price and decent printing quality. We are always trying our best to satisfy customer's needs!