信息安全
-
大学版董志勇本书主要包括网络技术方面的一些基本方法的介绍,以期给青少年介绍一些基本的网络知识,使他们在面临网络暗礁的时候不会慌乱,能够沉着应对。网络安全教育还包括在思想上教育青少年,使他们明白信息安全的重要性以及网络犯罪的危害,告诉他们青少年上网应该有一个什么样的心理,等等。在我们国家利用信息资源发展的关键时刻,有一本介绍网络安全的指导书籍就显得十分必要。 -
下一代网络安全思科系统中国网络技术有限公司下一代网络安全是一个新概念,本书对网络安全技术最近若干年发展的成果作了全面分析和归纳。全书分为四个部分,分别是:第一部分是下一代网络安全基础,包括经典的网络安全威胁原理和最新的网络安全攻击的分析;第二部分是下一代网络安全技术,指出了若干传统网络安全技术的最新发展和最新发展的若干网络安全新技术;第三部分是下一代网络安全管理,内容涵盖若干网络安全管理技术和方案;第四部分则给出了若干流行、实用的下一代网络安全实施方案。全书内容精致、系统、全面,可作为网络安全工程应用基础参考资料,也可作为高等院校信息安全及相关专业研究生和高年级本科生的教材。 -
信息安全及密码术Helger Lipmaa 著This book constitutes the refereed proceedings of the Second SKLOIS (State Key Laboratory of Information Security) Conference on Information Security and Cryptology, Inscrypt 2006 (formerly CISC), held in Beijing, China in November/December 2006.The 23 revised full papers presented were carefully reviewed and selected from 225 submissions. The papers are organized in topical sections on digital signature schemes, sequences and stream ciphers, symmetric-key cryptography, cryptographic schemes, network security, access control, computer and applications security, as well as Web and media security. -
计算机安全、可靠性与保密Janusz Górski 著This book constitutes the refereed proceedings of the 25th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2006, held in Gdansk, Poland, in September 2006.The 32 revised full papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on systems of systems, security and survivability analysis, nuclear safety and application of standards, formal approaches, networks dependability, coping with change and mobility, safety analysis and assessment, 6th FP integrated project DECOS, and modelling. -
隐私增强技术George Danezis 著This book constitutes the thoroughly refereed post-proceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May/June 2005.The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application context. -
操作系统安全贾春福、郑鹏本书是关于操作系统安全的教材,共分为七章,较为全面地介绍了操作系统安全的理论和关键技术。主要内容包括:操作系统安全的相关概念(基本名词和基本概念)、操作系统的安全机制、操作系统安全模型、操作系统的安全结构、主流操作系统(UNIX/Linux和windows)的安全机制与技术、操作系统的安全评测,以及操作系统的安全设计等方面的内容。本书内容丰富,深人浅出,特点鲜明,注重理论与实际应用的结合,利于学生较好地掌握所学到的知识和相关的技能。本书可作为信息安全、计算机科学技术、通信工程等专业的高年级本科生的教材;也可作为相关专业本科生和研究生,以及从事相关领域科研和工程的技术人员的参考书。本书共分为七章,较为全面地介绍了操作系统安全的理论和关键技术。第一章介绍了操作系统安全的相关概念,包括基本名词和基本概念等;第二章介绍了操作系统的安全机制,包括标识与鉴别机制、访问控制、最小特权管理、安全审计机制、可信通路和存储与运行保护等内容;第三章介绍了操作系统安全模型的相关概念及几种重要的操作系统安全模型;第四章介绍了操作系统的安全结构的内容;第五章介绍了主流操作系统UNIX/Linux和windows)的安全机制和技术;第六章介绍了操作系统的安全评测问题,包括国内外安全操作系统的评估标准和方法;第七章介绍了操作系统的安全设计等方面的内容。 -
信息及通信安全Peng Ning 等著This book constitutes the refereed proceedings of the 8th International Conference on Information and Communications Security, ICICS 2006, held in Raleigh, NC, USA in December 2006.The 22 revised full papers and 17 revised short papers presented were carefully reviewed and selected from 119 submissions. The papers are organized in topical sections on security protocols, applied cryptography, access control and systems security, privacy and malicious code, network security, systems security, cryptanalysis, applied cryptography and network security, as well as security implementations. -
信息系统安全Aditya Bagchi 著This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006.The 20 revised full papers and 5 short papers presented together with 4 invited papers and 3 ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security and are organized in topical sections on data and application security, access control, key management and security in wireless networks, threat analysis, detection and recovery, cryptography and encryption, as well as short papers and research reports. -
快速软件加密法Matt Robshaw 著This book constitutes the thoroughly refereed post-proceedings of the 13th International Workshop on Fast Software Encryption, FSE 2006, held in Graz, Austria in March 2006.The 27 revised full papers presented were carefully reviewed and selected from more than 100 submissions. The papers address all current aspects of fast and secure primitives for symmetric cryptology and they are organized in topical sections on stream ciphers, block ciphers, hash functions, analysis, proposals, modes and models, as well as implementation and bounds. -
侵入窃密检测最新进展Diego Zamboni 著This book constitutes the refereed proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection, RAID 2006, held in Hamburg, Germany in September 2006.The 16 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on anomaly detection, attacks, system evaluation and threat assessment, malware collection and analysis, anomaly- and specification-based detection, and network intrusion detection.
