Articles liés à 网络安全[WX]陈兵...

网络安全[WX]陈兵 等国防工业出版社9787118081312 - Couverture souple

 
9787118081312: 网络安全[WX]陈兵 等国防工业出版社9787118081312

Acheter neuf

Afficher cet article
EUR 48,12

Autre devise

EUR 12,92 expédition depuis Chine vers France

Destinations, frais et délais

Résultats de recherche pour 网络安全[WX]陈兵...

Image d'archives

BEN SHE
ISBN 10 : 7118081310 ISBN 13 : 9787118081312
Neuf paperback

Vendeur : liu xing, Nanjing, JS, Chine

Évaluation du vendeur 5 sur 5 étoiles Evaluation 5 étoiles, En savoir plus sur les évaluations des vendeurs

paperback. Etat : New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pub Date :2012-07-01 Pages: 210 Publisher: National Defence Industry Press title: universities password information security professional planning materials: network security original price: 30.00 yuan Author: Publisher: National Defense Industry Press Publication Date: July 1. 2012 ISBN: 9.787.118.081.312 words: Page: 210 Revision: 1 Binding: Paperback: Weight: 522 g Editor's Choice universities password information safety class professional planning materials: Network Security textbook suitable for undergraduate and graduate students as institutions of higher learning information security professional: for enterprise IT managers. IT personnel use. Executive Summary universities password information safety class professional planning textbook: Network Security expand around the network security. the first to introduce the basic concepts of network security. network security issues were reviewed; followed by the introduction of a common network attack techniques focus on understanding the various the principles and methods of attack; once again. for a variety of network security threats and attacks. raised a variety of security technologies. such as the isolation of the internal and external network through the firewall. identify authentication technology. data transmission across the public network through a VPN IDS attack strangled in the cradle; Finally. the introduction of safety management measures to make up for the deficiencies of the technical potential. The security of Contents Chapter 1 1.1 network security issues in network security concept proposed 1.2 computer network security the threat definition 1.4 1.3 computer network security network security the model structure 1.4.1OSI security services level model 1.4.2OSI of security services 1.4.3OSI 1.4. a 4OSI security services the layer configuration 1.4.5TCP/IP security service model 1.5 Chapter Summary 1.6 Chapter Exercises Chapter 2 common network attack techniques 2.1 network attacks challenger fragile 2.1.1 Network 2.1.2 Network Security 2.1.3 network the attack methods 2.1.4 network attack aimed 2.1.5 network attacks 2.2 data link layer attacks the technology 2.2.1MAC address deceive 2.2.2 electromagnetic information leakage 2.2.3 Network Monitor 2.3 network layer attack techniques 2.3.1 network layer scanning 2.3.2IP deceive 2.3.3 debris attack 2.3.4ICMP attack 2.3.5 The routing attack techniques to deceive 2.3.6ARP deceive 2.4 Transport Layer 2.4.1 port scan 2.4.2TCP initial serial number to deceive predict 2.4.3SYN flooding 2.4.4TCP 2.5 Application layer Attack 2.5.1 buffer overflow the 2.5.2 password attack 2.5.3 email attack 2.5.4DNS deceive 2.5.5SQL injection the 2.6 network virus of viruses and Trojans 2.6.1 Overview 2.6.2 Network Virus 2.6.3 Trojan horses 2.6.4 characteristics 2.6.5 Trojan Trojan 2.6.6 Trojan 2.7 denial of service attack 2.7.1 The principle of denial of service attacks distributed denial of service attack 2.8 Chapter Summary 2.9 Chapter Exercises Chapter 3 network authentication 2.7.2 3.1 3.1.3 The identity of the status and role of the network identity authentication concept 3.1.2 Overview 3.1.1 authentication information 3.1.4 authentication technology classification 3.2 commonly used network authentication technologies 3.2.1 the password authentication 3.2.2IC card certification 3.2 3.3.1 passwords .3 Certified 3.3 network authentication protocol based on biometric technology Introduction 3.3.2 3.3.3 asymmetric cryptographic authentication 3.4 single sign symmetrical password authentication 3.4.1 single point login basic principle 3.4.2 Single-point sign-on system Chapter 4 Network Access Control model 3.5 Chapter Summary 3.6 This chapter exercises 4.1 Access Control the foundation 4.1.1 Discretionary Access Control 4.1.2 Mandatory Access Control 4.1.3 Role-based Access Control 4.1.4 using the control model 4.1.5 several. N° de réf. du vendeur FU032378

Contacter le vendeur

Acheter neuf

EUR 48,12
Autre devise
Frais de port : EUR 12,92
De Chine vers France
Destinations, frais et délais

Quantité disponible : 1 disponible(s)

Ajouter au panier