书籍详情
信息安全原理与应用(第四版 英文版)
作者:Charles P.Pfleeger Shari Lawrence Pfleeger
出版社:电子工业出版社
出版时间:2007-08-01
ISBN:9787121047442
定价:¥79.00
购买这本书可以去
内容简介
《国外计算机科学教材系列:信息安全原理与应用(第4版)(英文版)》是一本信息安全的经典著作和权威指南,内容新颖丰富。全书系统地描述了计算安全的各方面问题,内容涉及计算机安全的概念和术语;密码学基础及应用;程序及软件安全;操作系统安全及可信任操作系统的设计;数据库及数据挖掘的安全;网络安全;安全管理;计算机安全经济学;计算安全中的隐私问题;计算安全中的法律和道德问题,最后是对密码学的深入研究。《国外计算机科学教材系列:信息安全原理与应用(第4版)(英文版)》既可以作为信息安全或计算机专业本科生、研究生的双语教材,也可以作为相关领域研究人员和专业技术人员的参考用书。
作者简介
Charles P.Pfleeger是一位独立的信息安全咨询师和Pfleeger顾问咨询集团的负责人。从事威胁、漏洞分析、系统设计评审、认证准备、专家鉴定和培训等。
目录
Chapter 1 Is There a Security Problem in Computing?
1.1 What Does "Secure" Mean?
Protecting Valuables
Characteristics of Computer Intrusion
1.2 Attacks
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 What's Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
2.1 Terminology and Background
Terminology
Representing Characters
2.2 Substitution Ciphers
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3 Transpositions (Permutations)
Columnar Transpositions
Combinations of Approaches
2.4 Making "Good" Encryption Algorithms
What Makes a "Secure" Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanaly$is--Breaking Encryption Schemes
2.5 The Data Encryption Standard
Background and History
Overview of the DES Algorithm
Double and Triple DES
Security of the DES
2.6 The AES Encryption Algorithm
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of DES and AES
2.7 Public Key Encryption
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained
1.1 What Does "Secure" Mean?
Protecting Valuables
Characteristics of Computer Intrusion
1.2 Attacks
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 What's Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
2.1 Terminology and Background
Terminology
Representing Characters
2.2 Substitution Ciphers
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3 Transpositions (Permutations)
Columnar Transpositions
Combinations of Approaches
2.4 Making "Good" Encryption Algorithms
What Makes a "Secure" Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanaly$is--Breaking Encryption Schemes
2.5 The Data Encryption Standard
Background and History
Overview of the DES Algorithm
Double and Triple DES
Security of the DES
2.6 The AES Encryption Algorithm
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of DES and AES
2.7 Public Key Encryption
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained
猜您喜欢