VIP会员
作者:CSDN
出版社:CSDN《程序员》
ISBN:1111111111117
VIP会员免费
(仅需0.8元/天)
¥ 40000.0
温馨提示: 价值40000元的1000本电子书,VIP会员随意看哦!
电子书推荐
-
计算机安全原理.pdf 评分:
内容简介 《计算机安全原理》讲述了计算机和网络安全的基础知识,同时覆盖计算技术行业协会(comptia)security+认证考试的全部内容,也覆盖了isc2 sscp认证考试的范围,重点围绕安全专家的实践、作用和责任。本书由信息技术安全领域最权威的专家撰写和编辑,讲授了通信、基础设施和操作安全的基础知识,以及防止攻击的方法。 《计算机安全原理》是作者多年工作经验的结晶,展示了发展信息安全和信息保障专业方法的重要性。本书的特色在于它既涵盖了资格考试内容,又介绍了基本原理,并在技术问题和管理问题之间进行了很好的平衡。 《计算机安全原理》清新的写作风格和亲切的语气使内容叙述详尽而容易理解,书中的例子非常清晰,可帮助初学者快速掌握本质,书中许多实际应用的例子对有经验的读者也有很好的参考价值。 作者简介 Wm.Arthur Conklin,Texas大学San Antonio分校(UTSA)商学院高级讲师,基础设施保障和安全中心(CIAS)研究科学家。目前正在攻读信息系统信息保障方面的博士学位。Conklin在UTSA取得MBA学位,并在California Monterey的海军研究生院取得电气工程的两个学位。现在的研究方向是信息隐藏和分布式计算的安全相关领域。Conklin曾在美国海军服役10年,担任地面战争指挥官和工程职责指挥官,在软件工程和项目管理领域有十多年的经验。他是Mc—Graw Hill的Security+证书全系列考试指南的作者之一。
上传时间:2012-12 大小:56.22MB
- 13.64MB
计算机安全原理与实践
2017-10-09In the four and a half years since the first edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field. To begin the process of revision, the first edition of this book was extensively reviewed by a number of professors who teach the subject and by professionals working in the field. The result is that in many places the narrative has been clarified and tightened, and illustrations have been improved
- 167.25MB
计算机安全原理与实践 Stallings.pdf
2018-02-26计算机安全 Stallings 计算机安全原理与实践 pdf 版本
- 6.48MB
计算机安全 原理与实践(computer security)-网络安全文档类资源
2021-01-15计算机安全 原理与实践(computer security)的PPT文件,备注中 解释的很详细,和书上的内容几乎一样多,,, 1-22章
- 13.65MB
04741计算机网络原理 2019.pdf
2020-08-04自考计算机网络原理(2019版的)知识点总结,PDF中不光有知识点的总结,还有对应的习题,最后还带有两套模拟试题,考前看了看,感觉帮助还是挺大的。
- 740KB
计算机系统安全.pdf
2021-10-05计算机系统安全.pdf
- 7.77MB
计算机网络原理――计算机网络安全.pdf
2023-11-24计算机网络原理――计算机网络安全.pdf
- 8.72MB
计算机安全原理3.pdf
2013-04-28计算机安全原理,很好的资源啊
- 183KB
FTP服务安全配置的原理.pdf
2022-07-10FTP服务安全配置的原理.pdf 学习资料 复习资料 教学资源
- 152KB
计算机组成原理试卷1.pdf
2022-06-03计算机组成原理试卷1.pdf
- 12.39MB
密码编码学与网络安全 — 原理与实践 第四版(英文)
2007-10-13《Cryptography and Network Security Principles and Practices, Fourth Edition》,这是由William Stallings所著的一本优秀的密码学教材,该书是第四版,反映了相关领域的新发展趋势与进展。该书的中文版《密码编码学与网络安全 — 原理与实践,第四版》已由电子工业出版社出版。
- 347KB
计算机网络安全.pdf
2021-09-20计算机网络安全.pdf
- 171KB
[计算机网络安全原理][吴扎发][习题解答].zip
2021-06-21[计算机网络安全原理][吴扎发][习题解答]
- 4.23MB
计算机网络原理第四版中文版答案
2008-12-17计算机网络第四版中文版答案,by Andrew
- 3.75MB
计算机网络 第4版答案
2014-03-11计算机网络第4版完整答案,条理清楚,通俗易懂。
- 359KB
计算机组成原理简答题.pdf
2022-03-23计算机组成原理简答题.pdf
- 498KB
计算机组成原理 作业三.pdf
2022-03-23计算机组成原理 作业三.pdf
- 14KB
计算机安全原理与实践第四版答案.docx
2023-05-22计算机安全原理与实践第四版答案
- 840KB
探究网络安全技术中数字签名的基本原理.pdf
2021-09-20探究网络安全技术中数字签名的基本原理.pdf
- 253KB
Biba-Bell-Lapadula安全模型与访问控制技术原理.pdf
2022-07-10Biba-Bell-Lapadula安全模型与访问控制技术原理.pdf 学习资料 复习资料 教学资源
- 928KB
软件安全原理.pdf
2020-01-07国科大软件安全原理期末复习知识点整理
- 5.40MB
经典书籍:安全学原理.pdf
2009-07-10经典书籍:安全学原理.pdf 经典书籍:安全学原理.pdf
- 574KB
计算机网络第四版习题及答案
2009-06-04计算机网络第四版习题及答案 很全很详细的
- 6.10MB
计算机系统安全--pdf
2009-10-27简述计算机系统安全的一些基本知识 比较全面
- 9.15MB
Computer Security: Art and Science 计算机安全:艺术与科学 PDF版
2014-03-02本书详尽地介绍了计算机安全的理论与实践,阐释了该领域最基本和最普遍的知识,包括计算机安全的本质和面临的挑战,策略与安全的关系,密码学的角色与应用,策略实现机制,保障技术和方法学,脆弱性分析和入侵检测等。同时把计算机系统、网络、人为因素和密码学等概念融为一体,本书可作为信息安全、计算机等相关专业本科生、研究生的教科书和学习参考书,也可作为维护网络和计算机系统安全的管理人员、信息安全技术开发人员的工具书和参考书。 The importance of computer security has increased dramatically during the past few years. Bishop provides a monumental reference for the theory and practice of computer security. This is a textbook intended for use at the advanced undergraduate and introductory graduate levels, non-University training courses, as well as reference and self-study for security professionals. Comprehensive in scope, this covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. Bishop treats the management and engineering issues of computer. Excellent examples of ideas and mechanisms show how disparate techniques and principles are combined (or not) in widely-used systems. Features a distillation of a vast number of conference papers, dissertations and books that have appeared over the years, providing a valuable synthesis. This book is acclaimed for its scope, clear and lucid writing, and its combination of formal and theoretical aspects with real systems, technologies, techniques, and policies. Preface Goals Philosophy Organization Roadmap Dependencies Background UndergraduateLevel GraduateLevel Practitioners SpecialAcknowledgment Acknowledgments PART1:INTRODUCTION ChapterIAnOverviewofComputerSecurity 1.1TheBasicComponents 1.2Threats 1.3PolicyandMechanism 1.4AssumptionsandTrust 1.5Assurance 1.6OperationalIssues 1.7HumanIssues 1.8TyingItAllTogether 1.9Summary 1.10ResearchIssues 1.11FurtherReading 1.12Exercises PART2:FOUNDATIONS Chapter2AccessControlMatrix 2.1ProtectionState 2.2AccessControlMatrixModel 2.3ProtectionStateTransitions 2.4Copying,Owning,andtheAttenuationofPrivilege 2.5Summary 2.6ResearchIssues 2.7FurtherReading 2.8Exercises Chapter3FoundationalResults 3.1TheGeneralQuestion 3.2BasicResults 3.3TheTake-GrantProtectionModel 3.4ClosingtheGap 3.5ExpressivePowerandtheModels 3.6Summary 3.7ResearchIssues 3.8FurtherReading 3.9Exercises PART3:POLICY Chapter4SecurityPolicies 4.1SecurityPolicies 4.2TypesofSecurityPolicies 4.3TheRoleofTrust 4.4TypesofAccessControl 4.5PolicyLanguages 4.6Example:AcademicComputerSecurityPolicy 4.7SecurityandPrecision 4.8Summary 4.9ResearchIssues 4.10FurtherReading 4.11Exercises Chapter5ConfidentialityPolicies 5.1GoalsofConfidentialityPolicies 5.2TheBell-LaPadulaModel 5.3Tranquility 5.4TheControversyovertheBell-LaPadulaModel 5.5Summary 5.6ResearchIssues 5.7FurtherReading 5.8Exercises Chapter6IntegrityPolicies 6.1Goals 6.2BibaIntegrityModel 6.3Lipner'sIntegrityMatrixModel 6.4Clark-WilsonIntegrityModel 6.5Summary 6.6ResearchIssues 6.7FurtherReading 6.8Exercises Chapter7HybridPolicies 7.1ChineseWallModel 7.2ClinicalInformationSystemsSecurityPolicy 7.3OriginatorControlledAccessControl 7.4Role-BasedAccessControl 7.5Summary 7.6ResearchIssues 7.7FurtherReading 7.8Exercises Chapter8NoninterferenceandPolicyComposition 8.1TheProblem 8.2DeterministicNoninterference 8.3Nondeducibility 8.4GeneralizedNoninterference 8.5Restrictiveness 8.6Summary 8.7ResearchIssues 8.8FurtherReading 8.9Exercises PART4:IMPLEMENTATIONI:CRYPTOGRAPHY Chapter9BasicCryptography 9.1WhatIsCryptography? 9.2ClassicalCryptosystems 9.3PublicKeyCryptography 9.4CryptographicChecksums 9.5Summary 9.6ResearchIssues 9.7FurtherReading 9.8Exercises Chapter10KeyManagement 10.1SessionandInterchangeKeys 10.2KeyExchange 10.3KeyGeneration 10.4CryptographicKeyInfrastructures 10.5StoringandRevokingKeys 10.6DigitalSignatures 10.7Summary 10.8ResearchIssues 10.9FurtherReading 10.10Exercises Chapter11CipherTechniques 11.1Problems 11.2StreamandBlockCiphers 11.3NetworksandCryptography 11.4ExampleProtocols 11.5Summary 11.6ResearchIssues 11.7FurtherReading 11.8Exercises Chapter12Authentication 12.1AuthenticationBasics 12.2Passwords 12.3Challenge-Response 12.4Biometrics 12.5Location 12.6MultipleMethods 12.7Summary 12.8ResearchIssues 12.9FurtherReading 12.10Exercises PART5:IMPLEMENTATIONII:SYSTEMS Chapter13DesignPrinciples 13.1Overview 13.2DesignPrinciples 13.3Summary 13.4ResearchIssues 13.5FurtherReading 13.6Exercises Chapter14RepresentingIdentity 14.1WhatIsIdentity? 14.2FilesandObjects 14.3Users 14.4GroupsandRoles 14.5NamingandCertificates 14.6IdentityontheWeb 14.7Summary 14.8ResearchIssues 14.9FurtherReading 14.10Exercises Chapter15AccessControlMechanisms 15.1AccessControlLists 15.2Capabilities 15.3LocksandKeys 15.4Ring-BasedAccessControl 15.5PropagatedAccessControlLists 15.6Summary 15.7ResearchIssues 15.8FurtherReading 15.9Exercises Chapter16InformationFlow 16.1BasicsandBackground 16.2NonlatticeInformationFlowPolicies 16.3Compiler-BasedMechanisms 16.4Execution-BasedMechanisms 16.5ExampleInformationFlowControls 16.6Summary 16.7ResearchIssues 16.8FurtherReading 16.9Exercises Chapter17ConfinementProblem 17.1TheConfinementProblem 17.2Isolation 17.3CovertChannels 17.4Summary 17.5ResearchIssues 17.6FurtherReading 17.7Exercises PART6:ASSURANCEContributedbyElisabethSullivan Chapter18IntroductiontoAssurance 18.1AssuranceandTrust 18.2BuildingSecureandTrustedSystems 18.3Summary 18.4ResearchIssues 18.5FurtherReading 18.6Exercises Chapter19BuildingSystemswithAssurance 19.1AssuranceinRequirementsDefinitionandAnalysis 19.2AssuranceDuringSystemandSoftwareDesign 19.3AssuranceinImplementationandIntegration 19.4AssuranceDuringOperationandMaintenance 19.5Summary 19.6ResearchIssues 19.7FurtherReading 19.8Exercises Chapter20FormalMethods 20.1FormalVerificationTechniques 20.2FormalSpecification 20.3EarlyFormalVerificationTechniques 20.4CurrentVerificationSystems 20.5Summary 20.6ResearchIssues 20.7FurtherReading 20.8Exercises Chapter21EvaluatingSystems 21.1GoalsofFormalEvaluation 21.2TCSEC:1983-1999 21.3InternationalEffortsandtheITSEC:1991-2001 21.4CommercialInternationalSecurityRequirements:1991 21.5OtherCommercialEfforts:Early1990s 21.6TheFederalCriteria:1992 21.7FIPS140:1994-Present 21.8TheCommonCriteria:1998-Present 21.9SSE-CMM:1997-Present 21.10Summary 21.11ResearchIssues 21.12FurtherReading 21.13Exercises PART7:SPECIALTOPICS Chapter22MaliciousLogic 22.1Introduction 22.2TrojanHorses 22.3ComputerViruses 22.4ComputerWorms 22.5OtherFormsofMaliciousLogic 22.6TheoryofMaliciousLogic 22.7Defenses 22.8Summary 22.9ResearchIssues 22.10FurtherReading 22.11Exercises Chapter23VulnerabilityAnalysis 23.1Introduction 23.2PenetrationStudies 23.3VulnerabilityClassification 23.4Frameworks 23.5GuptaandGligor'sTheoryofPenetrationAnalysis 23.6Summary 23.7ResearchIssues 23.8FurtherReading 23.9Exercises Chapter24Auditing 24.1Definitions 24.2AnatomyofanAuditingSystem 24.3DesigninganAuditingSystem 24.4APosterioriDesign 24.5AuditingMechanisms 24.6Examples:AuditingFileSystems 24.7AuditBrowsing 24.8Summary 24.9ResearchIssues 24.10FurtherReading 24.11Exercises Chapter25IntrusionDetection 25.1Principles 25.2BasicIntrusionDetection 25.3Models 25.4Architecture 25.5OrganizationofIntrusionDetectionSystems 25.6IntrusionResponse 25.7Summary 25.8ResearchIssues 25.9FurtherReading 25.10Exercises PART8:PRACTICUM Chapter26NetworkSecurity 26.1Introduction 26.2PolicyDevelopment 26.3NetworkOrganization 26.4AvailabilityandNetworkFlooding 26.5AnticipatingAttacks 26.6Summary 26.7ResearchIssues 26.8FurtherReading 26.9Exercises Chapter27SystemSecurity 27.1Introduction 27.2Policy 27.3Networks 27.4Users 27.5Authentication 27.6Processes 27.7Files 27.8Retrospective 27.9Summary 27.10ResearchIssues 27.11FurtherReading 27.12Exercises Chapter28UserSecurity 28.1Policy 28.2Access 28.3FilesandDevices 28.4Processes 28.5ElectronicCommunications 28.6Summary 28.7ResearchIssues 28.8FurtherReading 28.9Exercises Chapter29ProgramSecurity 29.1Introduction 29.2RequirementsandPolicy 29.3Design 29.4RefinementandImplementation 29.5CommonSecurity-RelatedProgrammingProblems 29.6Testing,Maintenance,andOperation 29.7Distribution 29.8Conclusion 29.9Summary 29.10ResearchIssues 29.11FurtherReading 29.12Exercises PART9:ENDMATTER Chapter30Lattices 30.1Basics 30.2Lattices 30.3Exercises Chapter31TheExtendedEuclideanAlgorithm 31.1TheEuclideanAlgorithm 31.2TheExtendedEuclideanAlgorithm 31.3Solvingaxmodn=1 31.4Solvingaxmodn=b 31.5Exercises Chapter32EntropyandUncertainty 32.1ConditionalandJointProbability 32.2EntropyandUncertainty 32.3JointandConditionalEntropy 32.4Exercises Chapter33VirtualMachines 33.1VirtualMachineStructure 33.2VirtualMachineMonitor 33.3Exercises Chapter34SymbolicLogic 34.1PropositionalLogic 34.2PredicateLogic 34.3TemporalLogicSystems 34.4Exercises Chapter35ExampleAcademicSecurityPolicy 35.1UniversityofCaliforniaE-mailPolicy 35.2TheAcceptableUsePolicyfortheUniversityofCalifomia,Davis Bibliography Index
- 932KB
微机原理及应用:第七章 微型计算机中断系统.pdf
2022-06-17微机原理及应用:第七章 微型计算机中断系统.pdf
- 29KB
计算机组成原理考试题.pdf
2022-06-11计算机组成原理考试题.pdf
- 4.17MB
通信原理课件:第4讲 角度调制与解调原理.pdf
2022-06-14通信原理课件:第4讲 角度调制与解调原理.pdf
- 1.36MB
主动安全网络架构——基于社会控制原理的网络安全技术.pdf
2021-09-19主动安全网络架构——基于社会控制原理的网络安全技术.pdf
- 130KB
路由器基本工作原理及网络安全介绍.pdf
2021-09-20路由器基本工作原理及网络安全介绍.pdf