注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全信息安全原理与应用(第四版 英文版)

信息安全原理与应用(第四版 英文版)

信息安全原理与应用(第四版 英文版)

定 价:¥79.00

作 者: Charles P.Pfleeger Shari Lawrence Pfleeger
出版社: 电子工业出版社
丛编项: 国外计算机科学教材系列
标 签: 信息安全

购买这本书可以去


ISBN: 9787121047442 出版时间: 2007-08-01 包装: 平装
开本: 16 页数: 845 字数:  

内容简介

  《国外计算机科学教材系列:信息安全原理与应用(第4版)(英文版)》是一本信息安全的经典著作和权威指南,内容新颖丰富。全书系统地描述了计算安全的各方面问题,内容涉及计算机安全的概念和术语;密码学基础及应用;程序及软件安全;操作系统安全及可信任操作系统的设计;数据库及数据挖掘的安全;网络安全;安全管理;计算机安全经济学;计算安全中的隐私问题;计算安全中的法律和道德问题,最后是对密码学的深入研究。《国外计算机科学教材系列:信息安全原理与应用(第4版)(英文版)》既可以作为信息安全或计算机专业本科生、研究生的双语教材,也可以作为相关领域研究人员和专业技术人员的参考用书。

作者简介

  Charles P.Pfleeger是一位独立的信息安全咨询师和Pfleeger顾问咨询集团的负责人。从事威胁、漏洞分析、系统设计评审、认证准备、专家鉴定和培训等。

图书目录

Chapter 1  Is There a Security Problem in Computing?
 1.1 What Does "Secure" Mean?
  Protecting Valuables
  Characteristics of Computer Intrusion
 1.2 Attacks
  Vulnerabilities, Threats, Attacks, and Controls
  Method, Opportunity, and Motive
 1.3 The Meaning of Computer Security
  Security Goals
  Vulnerabilities
 1.4 Computer Criminals
  Amateurs
  Crackers or Malicious Hackers
  Career Criminals
  Terrorists
 1.5 Methods of Defense
  Controls
  Effectiveness of Controls
 1.6 What's Next
  Encryption Overview
  Hardware and Software Security
  Human Controls in Security
  Encryption In-Depth
 1.7 Summary
 1.8 Terms and Concepts
 1.9 Where the Field Is Headed
 1.10 To Learn More
 1.11 Exercises
Chapter 2 Elementary Cryptography
 2.1 Terminology and Background
  Terminology
  Representing Characters
 2.2 Substitution Ciphers
  The Caesar Cipher
  Other Substitutions
  One-Time Pads
  Summary of Substitutions
 2.3 Transpositions (Permutations)
  Columnar Transpositions
  Combinations of Approaches
 2.4 Making "Good" Encryption Algorithms
  What Makes a "Secure" Encryption Algorithm?
  Symmetric and Asymmetric Encryption Systems
  Stream and Block Ciphers
  Confusion and Diffusion
  Cryptanaly$is--Breaking Encryption Schemes
 2.5 The Data Encryption Standard
  Background and History
  Overview of the DES Algorithm
  Double and Triple DES
  Security of the DES
 2.6 The AES Encryption Algorithm
  The AES Contest
  Overview of Rijndael
  Strength of the Algorithm
  Comparison of DES and AES
 2.7 Public Key Encryption
  Motivation
  Characteristics
  Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained

本目录推荐