网站首页  软件下载  游戏下载  翻译软件  电子书下载  电影下载  电视剧下载  教程攻略

请输入您要查询的图书:

 

书名 计算机安全原理(影印版)
分类 教育考试-大中专教材-成人教育
作者 (美)康克林
出版社 高等教育出版社
下载
简介
编辑推荐

本书从信息安全的三个层面——技术、实践和意识,较为全面地阐述了通信、基础设施和操作安全的基本原理;还详细介绍了计算机系统和网络如何防御各种攻击。同时,本书也涵盖了(ISC)2 SSCP认证考试的内容——该认证考试侧重于最佳实践、安全专家的角色以及责任。通过对本书的学习,既可以学习到计算机和网络安全的基础知识,又可以为参加CompTIA的Security+认证考试做好准备。本书适合作为计算机专业、信息系统与管理专业、电子信息科学专业的本科生教材。

内容推荐

通过本书,既可以学习到计算机和网络安全的基础知识,又可以为参加CompTIA的Security+认证考试做好准备;本书也涵盖了(ISC)2 SSCP认证考试的内容——该认证考试侧重于最佳实践、安全专家的角色以及责任。本书由IT安全领域的专家编写,从信息安全的三个层面——技术、实践和意识——较为全面地阐述了通信、基础设施和操作安全的基本原理;还详细介绍了计算机系统和网络如何防御各种攻击。

本书共包含24章,分别讲述了以下主题:计算机安全概论与趋势,一般的安全概念,运营/组织安全,人员在安全中的作用,加密,公钥基础结构,标准和协议,物理安全对网络安全的影响,网络基础,基础结构安全,远程访问,无线通信与及时消息,安全基线,攻击和恶意代码,Email,Web组件,软件开发,灾难恢复、业务连续性与组织策略,风险管理,变更管理,有关计算机的争论,安全与法律。

本书适合作为计算机专业、信息系统与管理专业、电子信息科学专业的本科生教材。

目录

Acknowledgments

Foreword

Preface

Introduction

Chapter 1 Introduction and Security Trends

The Security Problem

Security Incidents

Threats to Security

Security Trends

Avenues of Attack

The Steps in an Attack

Minimizing Possible Avenues of Attack

Types of Attacks

Ghapter Review

Chapter 2 General Security Concepts

Basic Security Terminology

Security Basics

Access Control

Authentication

Security Models

Confidentiality Models

Integrity Models

Chapter Review

Chapter 3 Operational/Organizational Security

Security Operations in Your Organization

Policies, Procedures, Standards, and Guidelines

The Security Perimeter

Physical Security

Access Controls

Physical Barriers

Social Engineering

Environment

Fire Suppression

Wireless

Electromagnetic Eavesdropping

Shielding

Location

Chapter

Chapter 4 The Role of People in Security

People--A Security Problem

Poor Security Practices

Social Engineering

People as a Security Tool

Security Awareness

Chapter Review

Chapter 5 Cryptography

Algorithms

Hashing

SHA

Message Digest (MD)

Hashing Summary

Symmetric Encryption

DES

3DES

AES

CAST

RC

Blowfish

IDEA

Symmetric Encryption Summary

Asymmetric Encryption

RSA

Diffie-Hellman

EIGamal

ECC

Asymmetric Encryption Summary

Usage

Confidentiality

Integrity

Nonrepudiation

Authentication

Digital Signatures

Key Escrow

Chapter Review

Chapter 6 Public Key Infrastructure

The Basics of Public Key Infrastructures

Certificate Authorities

Registration Authorities

Local Registration Authorities

Certificate Repositories

Trust and Certificate Verification

Digital Certificates

Certificate Attributes

Certificate Extensions

Certificate Lifecycles

Centralized or Decentralized Infrastructures

Hardware Storage Devices

Private Key Protection

Key Recovery

Key Escrow

Public Certificate Authorities

In-House Certificate Authorities

Outsourced Certificate Authorities

Tying Different PI(Is Together

Trust Models

Certificate Usage

Chapter Review

Chapter 7 Standards and Protocols

PKIX/PKCS

PKIX Standards

PKCS

Why You Need to Know

X.509

SSL/TLS

ISAKMP

CMP

XKMS

S/MIME

IETFS/MIME v3 Specifications

PGP

How It Works

Where Can You Use PCP?

HTFPS

IPSec

CEP

FIPS

Common Criteria (CC)

WTLS

WEP

WEP Security Issues

ISO 17799

Chapter Review

Chapter 8 The Impact of Physical Security on Network Security

The Problem

Physical Security Safeguards

Policies and Procedures

Access Controls

Authentication

Chapter Review

Chapter 9 Network Fundamentals

Network Architectures

Network Topology

Network Protocols

Packets

TCP vs. UDP

ICMP

Packet Delivery

Local Packet Delivery

Remote Packet Delivery

Subnetting

Network Address Translation

Chapter Review

Chapter 10 Infrastructure Security

Devices

Workstations

Savers

Network Interface Cards (NICs)

Hubs

Bridges

Switches

Routers

Firewalls

Wireless

Modems

RAS

Telecom/PBX

VPN

IDS

Network Monitoring/Diagnostic

Mobile Devices

Media

Coax

UTP/STP

Fiber

Unguided Media

Security Concerns for Transmission Media

Physical Security

Removable Media

Magnetic Media

Optical Media

Electronic Media

Security Topologies

Security Zones

VLANs

NAT

Tunneling

Ghapter Review

Chapter 11 Remote Access

The Remote Access Process

Identification

Authentication

Authorization

Telnet

SSH

L2TP and PPIp

PPIP

L2TP

IEEE 802.11

VPN

IPSec

IPSec Configurations

IPSec Security

IEEE 802. Ix

RADIUS

RADIUS Authentication

RADIUS Authorization

RADIUS Accounting

DIAMETER

TACACS+

TACACS+ Authentication

TAGACS+ Authorization

TAGAGS+ Accounting

Vulnerabilities

Connection Summary

Ghapter Review

Chapter 12 Wireless and Instant Hessaging

Wireless

WAP and WTLS

802.11

Instant Messaging

Chapter Review

Chapter 13 Intrusion Detection Systems

History of Intrusion Detectiion Systems

IDS Overview

Host-Based Intrusion Detection Systems

Advantages of Host-Based IDSs

Disadvantages of Host-Based IDSs

Active vs. Passive Host-Based IDSs

Network-Based Intrusion Detection Systems

Advantages of a Network-Based IDS

Disadvantages of a Network-Based 1DS

Active vs. Passive Network-Based IDSs

Signatures

False Positives and Negatives

IDS Models

Preventative Intrusion Detection Systems

IDS Products and Vendors

Honeypots

Incident Response

Ghapter Review

Chapter 14 Security Baselines

Oven, Jew Baselines

Password Selection

Password Polio/Guidelines

Selecting a Password

Components of a Good Password

Password Aging

Operating System and Network Operating System Hardening

Hardening Microsoft Operating Systems

Hardening UNIX-or Linux-BaSed Operating Systems

Network Hardening

Software Updates

Device Configuration

Ports and Services

Traffic Filtering

Application Hardening

Application Patches

Web Servers

Mall Servers

FIP Servers

DNS Servers

File and Print Services

Active Directory

Chapter Review

Chapter 15 Attacks and Malware

Attacking Computer Systems and Networks

DeniM-of-Service Attacks

Backdoors and Trapdoors

Sniffing

Spoofing

Man-in-the-Middle Attacks

Replay Attacks

TCP/IP Hijacking

Attacks on Encryption

Password Guessing

Software Exploitation

Wardialing and WarDriving

Social Engineering

Malware

Auditing

Chapter Review

Chapter 16 E-mail

Security of E-mail Transmissions

Malidous Code

Hoax E-mails

Unsolicited Commercial E-mail (Spare)

Mail Encrypfon

Chapter Review

Chapter 17 Web Components

Current Web Components and Concerns

Protocols

Encryption (SSL and TLS)

The Web (HTTP and HTIPS)

Web Services

Directory Services (DAP and LDAP)

File Transfer (FIT and SFTP)

Vulnerabilities

Code-Based Vulnerabilities

Buffer Overflows

Java and IavaScript

ActiveX

CGI

Server-Side Scripts

Cookies

Signed Applets

Browser Plug-Ins

Chapter Review

Chapter 18 Software Development

The Software EngineeeingProcess

Process Models

ROI and Error Correction

Secure Code Techniques

Good Practices

Requirements

Testing

Chapter Review

Chapter 19 Disaster Recovery, Business Continuity, and Organizational Policies

Disaster Recovery

Disaster Recovery Plans/Process

Backups

Utilities

Secure Recovery

High Availability and Fault Tolerance

Computer Incident Response Teams

Test, Exercise, and Rehearse

Policies and Procedures

Security Policies

Privacy

Service Level Agreements

Human Resources Policies

Code of Ethics

Incident Response Policies

Chapter Review

Chapter 20 Risk Management

An Overview of Risk Management

Macro-Level Example of Risk Management

International Banking

Key Terms Essential to Understanding Risk Management

What Is Risk Management?

Business Risks

Examples of Business Risks

Examples of Technology Risks

Risk Management Models

General Risk Management Model

Software Engineering Institute Model

Qualitatively Assessing Risk

Quantitatively Assessing Risk

Qualitative vs. Quantitative Risk Assessmem

Tools

Chapter Review

Chapter 21 Change Management

Why Change Management?

The Key Concept: Segregation of Duties

Elements of Change Management

Implementing Change Management

The Purpose of a Change Control Board

Code Integrity

The Capability Maturity Model

Chapter Review

Chapter 22 Privilege Management

User, Group, and Role Management

User.

Groups

Role

Single Sign-On

Centralized vs. Decentralized Management

Centralized Management

Decentralized Management

The Decentralized, Gentralized Model

Auditing (Privilege, Usage, and Escalation)

Privilege Auditing

Usage Auditing

Escalation Auditing

Handling Access Control (MAC, DAC, and RBAC)

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

Role-Based Access Control (RBAC)

Chapter Review

Chapter 23 Computer Forensics

Evidence

Standards for Evidence

Types of Evidence

Three Rules Regarding Evidence

Collecting Evidence

Acquiring Evidence

Identifying Evidence

Protecting Evidence

Transporting Evidence

Storing Evidence

Conducting the Investigation

Chain of Custody

Free Space vs. Slack Space

Free Space

Slack Space

What's This Message Digest and Hash?

Analysis

Chapter Review

Chapter 24 Security and Law

Import/Export Encryption Restrictions

United States Law

Non-U.S. Laws

Digital Signature Laws

Non-U.S. Laws

Digital Rights Management

Privacy Laws

United States Laws

European Laws

Computer Trespass

Convention on Cybercrime

Ethics

Chapter Review

Glossary

Index

随便看

 

霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。

 

Copyright © 2002-2024 101bt.net All Rights Reserved
更新时间:2025/2/23 6:10:19