出版日期:2007年08月
ISBN:9787121047442
[十位:7121047446]
页数:845
定价:¥79.00
店铺售价:¥31.60
(为您节省:¥47.40)
店铺库存:8
本

正在处理购买信息,请稍候……
我要买:
本
* 如何购买
联系店主:

13300000000
-
100分
满分
买家很懒,没有填写任何评论!
[2022-02-22 15:22:15]
刘****
呼和浩特市
-
100分
满分
确认收货后30天未评价,系统默认好评!
[2020-06-18 13:35:53]
毛**
东莞市
-
100分
满分
确认收货后30天未评价,系统默认好评!
[2017-11-25 17:18:53]
毛**
石家庄市
-
100分
满分
买家很懒,没有填写任何评论!
[2017-10-26 13:49:33]
毛**
石家庄市
-
100分
满分
确认收货后30天未评价,系统默认好评!
[2016-07-13 10:50:01]
毛**
石家庄市
《信息安全原理与应用(第四版)(英文版)》内容提要:
本书是一本信息**的经典著作和权威指南,内容新颖丰富。全书系统地描述了计算**的各方面问题,内容涉及计算机**的概念和术语;密码学基础及应用;程序及软件**;操作系统**及可信任操作系统的设计;数据库及数据挖掘的**;网络**;**管理;计算机**经济学;计算**中的隐私问题;计算**中的法律和道德问题,*后对密码学进行了深入研究。
本书既可以作为信息**或计算机专业本科生、研究生的双语教材,也可以作为相关领域研究人员和专业技术人员的参考用书。
《信息安全原理与应用(第四版)(英文版)》图书目录:
Chapter 1 Is There a Security Problem in Computing?
1.1 What Does "Secure" Mean?
Protecting Valuables
Characteristics of Computer Intrusion
1.2 Attacks
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3 The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4 Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5 Methods of Defense
Controls
Effectiveness of Controls
1.6 What's Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7 Summary
1.8 Terms and Concepts
1.9 Where the Field Is Headed
1.10 To Learn More
1.11 Exercises
Chapter 2 Elementary Cryptography
2.1 Terminology and Background
Terminology
Representing Characters
2.2 Substitution Ciphers
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3 Transpositions (Permutations)
Columnar Transpositions
Combinations of Approaches
2.4 Making "Good" Encryption Algorithms
What Makes a "Secure" Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanaly$is--Breaking Encryption Schemes
2.5 The Data Encryption Standard
Background and History
Overview of the DES Algorithm
Double and Triple DES
Security of the DES
2.6 The AES Encryption Algorithm
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of DES and AES
2.7 Public Key Encryption
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter 3 Program Security
Chapter 4 Protection in General-Purpose Operating Systems
Chapter 5 Designing Trusted Operating Systems
Chapter 6 Database and Data Mining Security
Chapter 7 Security in Networks
Chapter 8 Administering Security
Chapter 9 The Economics of Cybersecurity
Chapter 10 Privacy in Computing
Chapter 11 Legal and Ethical Issues in Computer Security
Chapter 12 Cryptography Explained
Bibliography
Index
《信息安全原理与应用(第四版)(英文版)》作者介绍:
Charles P.Pfleeger是一位独立的信息**咨询师和Pfleeger顾问咨询集团的负责人。从事威胁、漏洞分析、系统设计评审、认证准备、专家鉴定和培训等。