Lingua: Inglese
Editore: Beijing University of Posts and Telecommunications Press, 2014
ISBN 10: 7563540571 ISBN 13: 9787563540570
Da: liu xing, Nanjing, JS, Cina
EUR 60,27
Quantità: 5 disponibili
Aggiungi al carrellopaperback. Condizione: New. Language:Chinese.Computer Network Security Case Tutorial (21 century vocational planning materials).
Editore: China Electric Power Press, 2000
ISBN 10: 750833146X ISBN 13: 9787508331461
Da: liu xing, Nanjing, JS, Cina
EUR 58,19
Quantità: 3 disponibili
Aggiungi al carrellopaperback. Condizione: New. Language:Chinese.Paperback. Publisher: China Electric Power.
Lingua: Cinese
Editore: Peking University Press Pub. Date :2008-08-01, 1991
ISBN 10: 7301140843 ISBN 13: 9787301140840
Da: liu xing, Nanjing, JS, Cina
EUR 51,82
Quantità: 3 disponibili
Aggiungi al carrelloSoft cover. Condizione: New. Language:Chinese.Author:CHEN CHANG YANG YAN CHUN.Binding:Soft cover.Publisher:Peking University Press Pub. Date :2008-08-01.
Lingua: Cinese
Editore: China Electric Power Press Pub. Date :2010-03, 2000
ISBN 10: 7512300581 ISBN 13: 9787512300583
Da: liu xing, Nanjing, JS, Cina
EUR 57,04
Quantità: 1 disponibili
Aggiungi al carrellopaperback. Condizione: New. Paperback. Pub Date: 2010 Pages: 298 Language: Chinese in Publisher: China Electric Power Press Network Security Case Tutorial vocational education computer class professional planning materials. The book is by a large number of instances. introduces the basic concepts of computer network security systems. basic principles and key technologies. The book is divided into five chapters. the main contents of safe use of personal computers. including an overview of network security. LAN security t.
Da: liu xing, Nanjing, JS, Cina
EUR 63,18
Quantità: 3 disponibili
Aggiungi al carrellopaperback. Condizione: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2013-10-01 Pages: 257 Language: Chinese Publisher: Tsinghua University Press . computer network security technology case tutorial computer teaching reform in the new system planning materials to windows Setver 2003 as a platform. through practical case introduces network security computer network security technology so that students can apply their knowledge of network security knowledge . In the selection. organization and arrangement of content . emphasizing technical .Four Satisfaction guaranteed,or money back.
ISBN 10: 7302302456 ISBN 13: 9787302302452
Da: liu xing, Nanjing, JS, Cina
EUR 61,87
Quantità: 1 disponibili
Aggiungi al carrellopaperback. Condizione: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date: December 2012 Pages: 32 Language: English Publisher: Tsinghua University Press 21 century the universities computer network engineering professional planning materials: case-based network security technology and practice introduces the research and master network security technology necessary basic mathematical methods. typical knowledge of security protocols and network security. the main contents include cryptography mathematical foundations of classical cryptography calculation password. physical password. basic security protocol. N-party security protocols. network security architecture methods and techniques of network physical security. network security protocols. access control and VPN. firewall isolation network gateway. intrusion detection technology. computer virus. and synchronize the typical case in the practical application of these methods and technologies. The universities computer network engineering professional planning materials of the 21st century: a case-based network security technology and practice applies to computer majors as well as on the current cryptography and network security technicians interested. Contents: Chapter 1 of the first introduction of network security the concept 1.1.1 Overview 1.1 computer network security. computer network security the definition 1.1.2 computer network security the meaning 1.2 computer network security attack and defense 1.2.1 Lurker - who is a major threat to the offensive and defensive system 1.2.4 1.2.3 Network Security 1.2.2 hierarchical network security core problem affecting network security factor 1.3 macro level of computer network security the 1.3.1 security legislation 1.3.2 Security Management 1.3.3 Security 1.4.1 foreign laws and regulations of the laws and regulations of the technical measures 1.4 Computer Network Security 1.4.2 of the relevant laws and regulations 1.5 Summary 1.6 Exercises Chapter 2 mathematical foundation 2.1 Number Theory 2.1.1 divisible and euclidean division 2.1. 2.4 Information Theory 2 Fundamental Theorem of Arithmetic 2.1.3 2.3 discrete probability basis of abstract algebra the basis of the same I-2.1.4 Fermat's little theorem and Euler's theorem 2.2 2.5 calculated in the end how difficult: the basic concepts of complexity theory foundation 2.5.1 2.5. 2 computational model to determine the problem 2.5.3 complexity class 2.6 difficult to calculate its assumptions 2.6.1 large integer factorization problem and RSA 2.6.2 discrete number and Diffie-Hellman problem 2.6.3 elliptic curves and bilinear Chapter 3 classical cryptography issues 2.7 Summary 2.8 Exercises second cryptography - the foundation stone of 3.1 some interesting the puzzle instance 3.2 Password evolution: from the arts to the basic concept of a perfect 3.3 Cryptography 3.4 Classical replace classical cryptography 3.4.1 single code encryption method 3.4.2 classical multi-code encryption 3.5 Classical transposition cryptosystem 3.6 steganographic technique: the enemies communication 3.7 Summary 3.8 Exercises Chapter 4 the password 4.1 symmetric key cryptosystem 4.1.1 Symmetric password characteristics 4.1 4.1.3 .2 basic concepts of stream cipher stream cipher instance 4.1.4 block cipher basic concepts 4.1.5 packet password instance: DES algorithm 4.2 public key cryptography 4.2.1 password from the symmetric to asymmetric password 4.2.2 achieve: Diffie- Hellman key exchange 4.2.3 man-in-the-middle attack 4.2.4 RSA cryptosystem: make up 4.3 hash function Euler's theorem 4.3.1 cheese complete 4.3.2 pigeon hole principle with random oracle . third safety agreement - the convergence of Bridge Title IV network security - application of key Appendix ReferencesFour Satisfaction guaranteed,or money back.
Da: liu xing, Nanjing, JS, Cina
EUR 100,05
Quantità: 5 disponibili
Aggiungi al carrellopaperback. Condizione: New. Paperback. Pub Date: 278 Language: Chinese Publisher: Tsinghua University Press With the rapid development of computer networks. the security issues of computer networks have become more and more prominent. How can personal users prevent this increasingly serious problem? Computer Network Security and Management Classic Class (Fully Printing) Higher Hospital .