Foto dell'editore

Computer network security technology (Network Professional Vocational planning materials)(Chinese Edition)

XUE QING SHUI // ZHU YUAN ZHONG

ISBN 10: 7561138563 / ISBN 13: 9787561138564
Nuovi Condizione: New Brossura
Da liu xing (JiangSu, JS, Cina)

Libreria AbeBooks dal 7 aprile 2009

Quantità: 10

Compra nuovo
Prezzo: EUR 48,30 Convertire valuta
Spedizione: EUR 0,00 Da: Cina a: U.S.A. Destinazione, tempi e costi
Aggiungere al carrello

Riguardo questo articolo

Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 264 Publisher: Dalian University of Technology Pub. Date :2008-02-01 version 1. Contents: Chapter 1 Overview of Network Security 1.1 Network Security 1.2 Network definition of security events Glance 1.2.1 The origins of network security events 1.2 .2 Network - 1.2.3 new ways to steal money from the network - to vent their emotions the way network security situation is grim 1.3 China 1.4 Overview of Network Security Summary Chapter 2 Network Security Architecture Network Security 2.1 Basic Concepts 2.2 Network Security Architecture Framework 2.3 Network Security System features 2.4OSI Reference Model Chapter 3 of the safety of the structure and security of network data packets 3.1 packet-switched and packet structure 3.1.1 What is a packet-switched and packet 3.1.2 the information transfer process and the structure of the data packet 3.1.3 Learning Network protocols in network security in the sense of 3.2 packet capture and analysis 3.2.1 Principle 3.2.2 packet capture data capture method 3.2.3Sniffer Portable 3.2.4 software introduces data capture and data filtering 3.3 analysis using Sniffer Portable 3.3.2 3.3.1TCPIP protocol analysis of network protocols 3.3.3 Network layer protocol header structure 3.3.4 Transport Protocol header structure 3.4 data security 3.4.1 3.4.2 security risk to improve network security. to prevent network Chapter 4 sniffer measures 4.1 data encryption data encryption encryption technology overview 4.1.1 4.1.2 The origin and development of the basic concepts of cryptography password 4.1.3 Classification 4.2 instead of the traditional password system password 4.2.2 4.2.1 once a shift key password Password 4.2.3 4.3 4.3.1 Modern Cryptography 4.3.2 Symmetric cryptography 4.4 hybrid asymmetric cryptography encryption method 4.5Internet data encryption technology commonly used in Chapter 5 5.1 Key Management Key Management the contents of the key organizational structure 5.1.2 5.1.1 key generation key storage and protection 5.1.4 5.1.3 key update 5.1.5 key distribution 5.1.6 key authentication 5.1.7 key use 5.1. 8 Key Backup 5.1.9 key destroyed 5.2 5.2.1 Key Distribution Center key distribution method 5.2.2Diffie-Hellman cryptographic key exchange method 5.2.3 5.2.4 5.3 enhanced key negotiation method of global public 5.3.2 Management 5.3.1 the use of public key signature key and public key encryption key generation 5.3.3 5.3.4 5.3.5 public access to key backup and recovery 5.3.6 X.509-based PKI certificate Chapter 6. data integrity protection 6.1 Information Technology 6.1.1 Summary of the basic principles of 6.1.2MD5 algorithm Secure Hash Standard 6.1.4HMAC6.2 6.1.3 Digital Signatures 6.2.2 6.2.1 The concept of digital signatures based on public-key cryptosystem 6.2.3 Digital Signature private key cryptosystem based on the digital signature Digital Signature Standard DSS 6.2.4 Chapter 7 of authentication technologies 7.1 Overview 7.1.1 Entity authentication and identification of data sources made one-way hash function identification 7.2 Identification 7.1.2 mechanism for non-password authentication mechanism 7.2.1 7.2.2 symmetrical password authentication mechanism using public-key cryptosystem 7.2.3 Identification of mechanisms 7.3Kerberos system 7.3.1Kerberos certification program 7.3.2Kerloems limitations 7.4GSSAPIv27.4.1 single TGT The Kerberos7.4.2 double the Kerberos TGT Chapter 8 8.1 Access Control and Firewall Access Control 8.2 The basic principle of common operating system access control 8.2.1Windows 2000 8.2.2Linux in the access control access control 8.3.1 Firewall 8.3 firewall technology The concept of firewall technology classification 8.3.3 8.3.2 The main technical parameters Firewall 8.3.4 Firewall basic architecture 8.3.5 8.3.6 firewall settings firewall deployment case 8.3.7Linux Kernel Firewall Chapter 9 9.1 computer viruses and computer defense The concept of virus co. Codice inventario libreria LQ4969

Fare una domanda alla libreria

Dati bibliografici

Titolo: Computer network security technology (...

Legatura: paperback

Condizione libro:New

Descrizione articolo

Riassunto:

Paperback. Pub Date: 2008 Pages: 264 Language: Chinese in Publisher: Dalian University of Technology Press. the main contents of the computer network security technology: With the rapid development and wide application of information technology. accelerating the process of social information information the basis of the network. the global role is increasing. The society growing dependence on information technology. information network security issues become more important. This. along with the rapid development of China's socialist market economy. China is about to or have already become the world's manufacturing center. businesses increasingly need to have a comprehensive vocational ability and overall quality. work directly in production. technology. management and service first line application. skilled senior practical talents. It can be predicted. vocational and techni...

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

Descrizione libreria

Thank you for visiting My bookstore! We are an online bookstore, and Is the China's largest online book sales. Generally our books are from China, with reasonable price and decent printing quality. We are always trying our best to satisfy customer's needs!

Visita la pagina della libreria

Condizioni di vendita:

We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...

Ulteriori informazioni
Condizioni di spedizione:

Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.

Tutti i libri della libreria

Metodi di pagamento
accettati dalla libreria

Visa Mastercard American Express Carte Bleue

PayPal Bonifico bancario