资源描述:
《Network Security Essentials, Applications and Standards,William Stallings》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、NETWORKSECURITYESSENTIALS:APPLICATIONSANDSTANDARDSFOURTHEDITIONWilliamStallingsPrenticeHallBostonColumbusIndianapolisNewYorkSanFranciscoUpperSaddleRiverAmsterdamCapeTownDubaiLondonMadridMilanMunichParisMontrealTorontoDelhiMexicoCitySaoPauloSydneyHongKongSeoulSi
2、ngaporeTaipeiTokyoVicePresidentandEditorialDirector,ECS:ManagingEditor:ScottDisannoMarciaJ.HortonProductionManager:WandaRockwellEditorinChief,ComputerScience:MichaelArtDirector:JayneConteHirschCoverDesigner:BruceKenselaarExecutiveEditor:TracyDunkelbergerCoverAr
3、t:ShutterstockAssistantEditor:MelindaHaggertyArtEditor:GregDullesEditorialAssistant:AllisonMichaelCopyright©2011PearsonEducation,Inc.,publishingas[PrenticeHall,1LakeStreet,UpperSaddleRiver,NJ07458].Allrightsreserved.ManufacturedintheUnitedStatesofAmerica.Thispu
4、blicationisprotectedbyCopyright,andpermissionshouldbeobtainedfromthepublisherpriortoanyprohibitedreproduction,storageinaretrievalsystem,ortransmissioninanyformorbyanymeans,electronic,mechanical,photocopying,recording,orlikewise.Toobtainpermission(s)tousemateria
5、lfromthiswork,pleasesubmitawrittenrequesttoPearsonEducation,Inc.,PermissionsDepartment,[imprintpermissionsaddress].Manyofthedesignationsbymanufacturersandsellertodistinguishtheirproductsareclaimedastrademarks.Wherethosedesignationsappearinthisbook,andthepublish
6、erwasawareofatrademarkclaim,thedesignationshavebeenprintedininitialcapsorallcaps.LibraryofCongressCataloging-in-PublicationData10987654321ISBN10:0-13-610805-9ISBN13:978-0-13-610805-4ToAntigoneneverdullneverboringalwaysaSageThispageintentionallyleftblankCONTENTS
7、PrefaceixAbouttheAuthorxivChapter1Introduction11.1ComputerSecurityConcepts31.2TheOSISecurityArchitecture81.3SecurityAttacks91.4SecurityServices131.5SecurityMechanisms161.6AModelforNetworkSecurity191.7Standards211.8OutlineofThisBook211.9RecommendedReading221.10I
8、nternetandWebResources231.11KeyTerms,ReviewQuestions,andProblems25PARTONECRYPTOGRAPHY27Chapter2SymmetricEncryptionandMessageConfidentiality272.1SymmetricEncryptionPrinciples