{{sellerTotalView > 1 ? __("sellers", {number: sellerTotalView}) : __("seller", {number: sellerTotalView}) }}, {{numTotalView > 1 ? __("items", {number: numTotalView}) : __("item", {number: numTotalView}) }}
free FREE

Change Your Zip Code

Inventory information and delivery speeds may vary for different locations.

Location History

{{email ? __('Got it!') : __('Restock Alert')}}

We will notify you by email when the item back in stock.

Cancel
Yami

Jingdong book

大学计算机教育国外著名教材系列·网络安全基础:应用与标准(第4版)

{{buttonTypePin == 3 ? __("Scan to view more PinGo") : __("Scan to start")}}

大学计算机教育国外著名教材系列·网络安全基础:应用与标准(第4版)

{{__(":people-members", {'people': item.limit_people_count})}} {{ itemCurrency }}{{ item.valid_price }} {{ itemCurrency }}{{ item.invalid_price }} {{ itemDiscount }}
Ends in
{{ itemCurrency }}{{ item.valid_price }}
{{ itemCurrency }}{{ priceFormat(item.valid_price / item.bundle_specification) }}/{{ item.unit }}
{{ itemDiscount }}
{{ itemCurrency }}{{ item.valid_price }} {{ itemCurrency }}{{ priceFormat(item.valid_price / item.bundle_specification) }}/{{ item.unit }} {{ itemCurrency }}{{ item.invalid_price }} {{itemDiscount}}
{{ itemCurrency }}{{ item.valid_price }}
Sale ends in
Sale will starts after Sale ends in
{{ getSeckillDesc(item.seckill_data) }}
{{ __( "Pay with Gift Card to get sale price: :itemCurrency:price", { 'itemCurrency' : itemCurrency, 'price' : (item.giftcard_price ? priceFormat(item.giftcard_price) : '0.00') } ) }} ({{ itemCurrency }}{{ priceFormat(item.giftcard_price / item.bundle_specification) }}/{{ item.unit }}) Details
Best before

Currently unavailable.

We don't know when or if this item will be back in stock.

Unavailable in your area.
Sold Out

Details

Full product details
Content Description

《网络安全基础:应用与标准(第4版)(影印版)》由著名作者William Stallillgs编写,以当今网络安全的实际解决方案为基础,既简明扼要,又全面系统地介绍了网络安全的主要内容,包括基本原理、重要技术、主要方法和重要的工业标准等。全书共包含11章。除第1章引言外,其余各章分为三大部分叙述:第一部分是密码学,重点介绍分组密码、流密码、消息认证码、安全杂凑函数、公钥密码和数字签名等的基本原理、主要方法和重要应用场景等,并简要介绍了几种常用的典型算法,包括DES算法、AES算法、RC4算法和RSA算法等;第二部分是网络安全应用,简要介绍了传输层安全中的SSL/TLS协议、无线局域网安全及WAP协议、电子邮件安全与PGP与S/MIME协议;IP层安全与IPsec协议等。第三部分是系统安全,简要介绍了入侵检测与口令管理、恶意软件与防火墙等。
《网络安全基础:应用与标准(第4版)(影印版)》以最新和实用的网络安全知识为主题,采用深入浅出的叙述手法,每章末尾还给出一定的推荐读物和思考练习题。因此,《网络安全基础:应用与标准(第4版)(影印版)》既是高等学校网络安全基础课程的好教材,也是工程技术人员和网络爱好者了解网络安全基本概貌的好读物。
Catalogue

Preface ix
About the Author xiv
Chapter 1 Introduction 1
1.1 Computer Security Concepts 3
1.2 The OSI Security Architecture 8
1.3 Security Attacks 9
1.4 Security Services 13
1.5 Security Mechanisms 16
1.6 A Model for Network Security 19
1.7 Standards 21
1.8 Outline of This Book 21
1.9 Recommended Reading 22
1.10 Internet and Web Resources 23
1.11 Key Terms, Review Questions, and Problems 25

PART ONE CRYPTOGRAPHY 27
Chapter 2 Symmetric Encryption and Message Confidentiality 27
2.1 Symmetric Encryption Principles 28
2.2 Symmetric Block Encryption Algorithms 34
2.3 Random and Pseudorandom Numbers 42
2.4 Stream Ciphers and RC4 45
2.5 Cipher Block Modes of Operation 50
2.6 Recommended Reading andWeb Sites 55
2.7 Key Terms, Review Questions, and Problems 56

Chapter 3 Public-Key Cryptography and Message Authentication 61
3.1 Approaches to Message Authentication 62
3.2 Secure Hash Functions 67
3.3 Message Authentication Codes 73
3.4 Public-Key Cryptography Principles 79
3.5 Public-Key Cryptography Algorithms 83
3.6 Digital Signatures 90
3.7 Recommended Reading and Web Sites 90
3.8 Key Terms, Review Questions, and Problems 91

PART TWO NETWORK SECURITY APPLICATIONS 97
Chapter 4 Key Distribution and User Authentication 97
4.1 Symmetric Key Distribution Using Symmetric Encryption 98
4.2 Kerberos 99
4.3 Key Distribution Using Asymmetric Encryption 114
4.4 X.509 Certificates 116
4.5 Public-Key Infrastructure 124
4.6 Federated Identity Management 126
4.7 Recommended Reading and Web Sites 132
4.8 Key Terms, Review Questions, and Problems 133

Chapter 5 Transport-Level Security 139
5.1 Web Security Considerations 140
5.2 Secure Socket Layer and Transport Layer Security 143
5.3 Transport Layer Security 156
5.4 HTTPS 160
5.5 Secure Shell (SSH) 162
5.6 Recommended Reading and Web Sites 173
5.7 KeyTerms, Review Questions, and Problems 173

Chapter 6 Wireless Network Security 175
6.1 IEEE 802.11 Wireless LAN Overview 177
6.2 IEEE 802.11i Wireless LAN Security 183
6.3 Wireless Application Protocol Overview 197
6.4 Wireless Transport Layer Security 204
6.5 WAP End-to-End Security 214
6.6 Recommended Reading andWeb Sites 217
6.7 Key Terms, Review Questions, and Problems 218

Chapter 7 Electronic Mail Security 221
7.1 Pretty Good Privacy 222
7.2 S/MIME 241
7.3 DomainKeys Identified Mail 257
7.4 Recommended Reading and Web Sites 264
7.5 Key Terms, Review Questions, and Problems 265
Appendix 7A Radix-64 Conversion 266

Chapter 8 IP Security 269
8.1 IP Security Overview 270
8.2 IP Security Policy 276
8.3 Encapsulating Security Payload 281
8.4 Combining Security Associations 288
8.5 Internet Key Exchange 292
8.6 Cryptographic Suites 301
8.7 Recommended Reading and Web Sites 302
8.8 Key Terms, Review Questions, and Problems 303

PART THREE SYSTEM SECURITY 305
Chapter 9 Intruders 305
9.1 Intruders 307
9.2 Intrusion Detection 312
9.3 Password Management 323
9.4 Recommended Reading and Web Sites 333
9.5 Key Terms, Review Questions, and Problems 334
Appendix 9A The Base-Rate Fallacy 337

Chapter 10 Malicious Software 340
10.1 Types of Malicious Software 341
10.2 Viruses 346
10.3 Virus Countermeasures 351
10.4 Worms 356
10.5 Distributed Denial of Service Attacks 365
10.6 Recommended Reading and Web Sites 370
10.7 Key Terms, Review Questions, and Problems 371

Chapter 11 Firewalls 374
11.1 The Need for Firewalls 375
11.2 Firewall Characteristics 376
11.3 Types of Firewalls 378
11.4 Firewall Basing 385
11.5 FirewaU Location and Configurations 388
11.6 Recommended Reading and Web Site 393
11.7 Key Terms, Review Questions, and Problems 394

APPENDICES 398
Appendix ASome Aspects of Number Theory 398
A.1 Prime and Relatively Prime Numbers 399
A.2 Modular Arithmetic 401
Appendix BProjects for Teaching Network Security 403
B.1 Research Projects 404
B.2 Hacking Project 405
B.3 Programming Projects 405
B.4 Laboratory Exercises 406
B.5 Practical Security Assessments 406
B.6 Writing Assignments 406
B.7 Reading/Report Assignments 407
Index 408
ONLINE CHAPTERS

Chapter 12 Network Management Security
12.1 Basic Concepts of SNMP
12.2 SNMPvl Community Facility
12.3 SNMPv3
12.4 Recommended Reading and Web Sites
12.5 Key Terms, Review Questions, and Problems

Chapter 13 Legal and Ethical Aspects
13.1 Cybercrime and Computer Crime
13.2 Intellectual Property
13.3 Privacy
13.4 Ethical Issues
13.5 Recommended Reading and Web Sites
13.6 Key Terms, Review Questions, and Problems
ONLINE APPENDICES
Appendix CStandards and Standards-Setting Organizations
C.1 The Importance of Standards
C.2 Internet Standards and the Internet Society
C.3 National Institute of Standards and Technology
Appendix D TCP/IP and OSI
D.1 Protocols and Protocol Architectures
D.2 The TCP/IP Protocol Architecture
D.3 The Role of an Internet Protocol
D.4 IPv4
D.5 IPv6
D.6 The OSI Protocol Architecture
Appendix E Pseudorandom Number Generation
E.1 PRNG Requirements
E.2 PRNG Using a Block Cipher
E.3 PRNG Using a Hash Function or Message Authentication Code
Appendix F Kerberos Encryption Techniques
E 1Password-to-Key Transformation
E2Propagating Cipher Block Chaining Mode
Appendix G Data Compression Using ZIP
G.1 Compression Algorithm
G.2 Decompression Algorithm
Appendix H PGP Random Number Generation
H.1 True Random Numbers
H.2 Pseudorandom Numbers
Appendix I The International Reference Alphabet
Glossary
References
Book Abstract

3DES has two attractions that assure its widespread use over the next few years. First, with its 168-bit key length, it overcomes the vulnerability to brute-force attack of DEA. Second, the underlying encryption algorithm in 3DES is the same as in DEA. This algorithm has been subjected to more scrutiny than any other encryption algorithm over a longer period of time, and no effective cryptanalytic attack based on the algorithm rather than brute force has been found. Accordingly, there is a high level of confidence that 3DES is very resistant to cryptanalysis. If security were the only consideration, then 3DES would be an appropriate choice for a standardized encryption algorithm for decades to come.
The principal drawback of 3DES is that the algorithm is relatively sluggish in software. The original DEA was designed for mid-1970s hardware implementation and does not produce efficient software code. 3DES, which has three times as many rounds as DEA, is correspondingly slower. A secondary drawback is that both DEA and 3DES use a 64-bit block size. For reasons of both efficiency and security, a larger lock size is desirable.
Because of these drawbacks, 3DES is not a reasonable candidate for long-term se. As a replacement, NIST in 1997 issued a call for proposals for a new Advanced ncryption Standard (AES), which should have a security strength equal to or better han 3DES and significantly improved efficiency. In addition to these general equirements, NIST specified that AES must be a symmetric block cipher with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits. Evaluation criteria included security, computational efficiency, memory requirements, hardware and software suitability, and flexibility.
Introduction

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This, in turn, has led to a heightened awareness of the need to protect data and resources from disclosure, to guarantee the authenticity of data and messages, and to protect systems from network-based attacks. Second, the disciplines of cryptography and network security have matured, leading to the development of practical, readily available applications to enforce network security.
It is the purpose of this book to provide a practical survey of network security applications and standards. The emphasis is on applications that are widely used on the Internet and for corporate networks, and on standards (especially Internet standards) that have been widely deployed. This book is intended for both an academic and a professional audience. As a textbook, it is intended as a one-semester undergraduate course on network security for computer science, computer engineering, and electrical engineering majors. It covers the material in IAS2 Security Mechanisms, a core area in the Information Technology body of knowledge; and NET4 Security, another core area in the Information Technology body of knowledge. These subject areas are part of the Draft ACM/IEEE Computer Society Computing Curricula 2005.

Specifications

Brand Jingdong book
Brand Origin China

Disclaimer

Product packaging, specifications and price are subject to change without notice. All information about the products on our website is provided for information purposes only. Please always read labels, warnings and directions provided with the product before use.

View Full Terms of Use
Add to favorites
{{ $isZh ? coupon.coupon_name_sub : coupon.coupon_ename_sub | formatCurrency }}
{{__("Buy Directly")}} {{ itemCurrency }}{{ item.directly_price }}
Quantity
{{ quantity }}
{{ instockMsg }}
{{ limitText }}
{{buttonTypePin == 3 ? __("Scan to view more PinGo") : __("Scan to start")}}
Sold by JD@CHINA
Ship to
{{ __("Ship to United States only") }}
Free shipping over 69
Genuine guarantee

Added to Cart

Keep Shopping

More to Consider

{{ item.brand_name }}

{{ item.item_name }}

{{ item.currency }}{{ item.market_price }}

{{ item.currency }}{{ item.unit_price }}

{{ item.currency }}{{ item.unit_price }}

Coupons

{{ coupon.coupon_name_new | formatCurrency }}
Clip Clipped Over
{{ getCouponDescStr(coupon) }}
{{ coupon.use_time_desc }}
Expires soon {{ formatTime(coupon.use_end_time) }}

Share this item with friends

Cancel

Yami Gift Card

Get this exclusive deal when paying with gift card

Terms and Conditions

Gift card deals are special offers for selected products;

The gift card deals will automatically be activated if a customer uses gift card balance at check out and the balance is sufficient to pay for the total price of the shopping cart products with gift card deals;

You will not be able to activate the gift card deals if you choose other payment methods besides gift card. The products will be purchased at their normal prices;

If your account balance is not enough to pay for the products with gift card deals, you can choose to reload your gift card balance by clicking on the Reload button at either shopping cart page or check out page;

Products that have gift card deals can be recognized by a special symbol showing 'GC Deal';

For any additional questions or concerns, please contact our customer service;

Yamibuy reserves the right of final interpretation.

Sold by Yami

Service Guarantee

Yami Free Shipping over $49
Yami Easy Returns
Yami Ships from United States

Shipping

  • United States

    Standard Shipping is $5.99 (Excluding Alaska & Hawaii). Free on orders of $49 or more.

    Local Express is $5.99 (Available in Parts of CA, NJ, MA & PA). Free on orders of $49 or more.

    2-Day Express (Includes Alaska & Hawaii) starts at $19.99.

Return Policy

Yami is committed to provide our customers with a peace of mind when purchasing from us. Most items shipped from Yamibuy.com can be returned within 30 days of receipt of shipment (For Food, Beverages, Snacks, Dry Goods, Health supplements, Fresh Grocery and Perishables Goods, within 7 days of receipt of shipment due to damages or quality issues; To ensure that every customer receives safe and high-quality products, we do not provide refunds or returns for beauty products once they have been opened or used, except in the case of quality issues; Some products may have different policies or requirements associated with them, please see below for products under special categories, or contact Yami Customer Service for further assistance).
Thank you for your understanding and support.

Learn More

Sold by Yami

Terms and Conditions of Yami E-Gift Card

If you choose “Redeem automatically” as your delivery method, your gift card balance will be reload automatically after your order has been processed successfully;

If you choose “Send to Email”as your delivery method, the card number and CVV will be sent to the email address automatically;

Any user can use the card number and CVV to redeem the gift card, please keep your gift card information safely. If you have any trouble receiving email, please contact Yami customer service;

Yami gift card can be used to purchase both Yami owned or Marketplace products;

Yami gift card will never expire;

Yami gift card balance does not have to be used up at once;

All rights reserved by Yami.

Return Policy

Gift card that has already been consumed is non-refundable.

Sold by JD@CHINA

Service Guarantee

Yami Free Shipping over $49
Yami Easy Returns
Yami Ships from United States

Shipping

  • United States

    Standard Shipping is $5.99 (Excluding Alaska & Hawaii). Free on orders of $49 or more.

    Local Express is $5.99 (Available in Parts of CA, NJ, MA & PA). Free on orders of $49 or more.

    2-Day Express (Includes Alaska & Hawaii) starts at $19.99.

Return Policy

You may return product within 30 days upon receiving the product. Items returned must be new in it's original packing, including the original invoice for the purchase. Customer return product at their own expense.

Sold by JD@CHINA

Service Guarantee

Yami Cross-store Free Shipping over $69
Yami 30-days Return

Yami-China FC

Yami has a consolidation warehouse in China which collects multiple sellers’ packages and combines to one order. Our Yami consolidation warehouse will directly ship the packages to your door. Cross-store free shipping over $69.

Return Policy

You may return products within 30 days upon receiving the products. Sellers take responsibilities for any wrong shipment or missing items. Packing needs to be unopened for any other than quality issues return. We promise to pack carefully, but because goods are taking long journey to destinations, simple damages to packaging may occur. Any damages not causing internal goods quality problems are not allowed to return. If you open the package and any quality problem is found, please contact customer service within three days after receipt of goods.

Shipping Information

Yami Consolidation Service Shipping Fee $9.99(Free shipping over $69)

Sellers in China will ship their orders within 1-2 business days once the order is placed. Packages are sent to our consolidation warehouse in China and combined there. Our Yami consolidation warehouse will directly ship the packages to you via UPS. The average time for UPS to ship from China to the United States is about 10 working days and it can be traced using the tracking number. Due to the pandemic, the delivery time may be delayed by about 5 days. The package needs to be signed by the guest. If the receipt is not signed, the customer shall bear the risk of loss of the package.

Sold by JD@CHINA

Service Guarantee

Free shipping over 69
Genuine guarantee

Shipping

Yami Consolidated Shipping $9.99(Free shipping over $69)


Seller will ship the orders within 1-2 business days. The logistics time limit is expected to be 7-15 working days. In case of customs clearance, the delivery time will be extended by 3-7 days. The final receipt date is subject to the information of the postal company.

Yami Points information

All items are excluding from any promotion or points events on Yamibuy.com

Return Policy

You may return product within 30 days upon receiving the product. Items returned must be new in it's original packing, including the original invoice for the purchase. Customer return product at their own expense.

Yami

Download the Yami App

Back Top

Recommended for You

About the brand

Jingdong book

为您推荐

Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折
Yami
欣葉
2种选择
欣叶 御大福 芋头麻薯 180g

周销量 600+

$1.66 $1.99 83折

Reviews{{'('+ commentList.posts_count + ')'}}

Have your say. Be the first to help other guests.

Write a review
{{ totalRating }} Write a review
  • {{i}} star

    {{i}} stars

    {{ parseInt(commentRatingList[i]) }}%

Yami Yami
{{ comment.user_name }}

{{ showTranslate(comment) }}Show Less

{{ strLimit(comment,800) }}Show more

Show Original

{{ comment.content }}

Yami
Show All

{{ formatTime(comment.in_dtm) }} VERIFIED PURCHASE {{groupData}}

{{ comment.likes_count }} {{ comment.likes_count }} {{ comment.reply_count }} {{comment.in_user==uid ? __('Delete') : __('Report')}}
Yami Yami
{{ comment.user_name }}

{{ showTranslate(comment) }}Show Less

{{ strLimit(comment,800) }}Show more

Show Original

{{ comment.content }}

Yami
Show All

{{ formatTime(comment.in_dtm) }} VERIFIED PURCHASE {{groupData}}

{{ comment.likes_count }} {{ comment.likes_count }} {{ comment.reply_count }} {{comment.in_user==uid ? __('Delete') : __('Report')}}

No related comment~

Review

Yami Yami

{{ showTranslate(commentDetails) }}Show Less

{{ strLimit(commentDetails,800) }}Show more

Show Original

{{ commentDetails.content }}

Yami
Show All

{{ formatTime(commentDetails.in_dtm) }} VERIFIED PURCHASE {{groupData}}

{{ commentDetails.likes_count }} {{ commentDetails.likes_count }} {{ commentDetails.reply_count }} {{commentDetails.in_user==uid ? __('Delete') : __('Report')}}

Please write at least one word

Comments{{'(' + replyList.length + ')'}}

Yami Yami

{{ showTranslate(reply) }}Show Less

{{ strLimit(reply,800) }}Show more

Show Original

{{ reply.reply_content }}

{{ formatTime(reply.reply_in_dtm) }}

{{ reply.reply_likes_count }} {{ reply.reply_likes_count }} {{ reply.reply_reply_count }} {{reply.reply_in_user==uid ? __('Delete') : __('Report')}}

Please write at least one word

Cancel

That’s all the comments so far!

Write a review
How would you rate this item?

Please add your comment.

  • A nice nickname will make your comments more popular!
  • The nickname in your account will be changed to the same as here.
Thanks for your review
Our community rely on great reviews like yours to find the best of Asia.

Report

If you find this content inappropriate and think it should be removed from the Yami.com site, let us know please.

Cancel

Are you sure to delete your review?

Cancel

You’ve Recently Viewed

About the brand

Jingdong book