信息安全原理与应用(第四版)(英文版)
分類: 图书,计算机/网络,信息安全,
作者: (美)弗莱格 等著
出 版 社: 电子工业出版社
出版时间: 2007-8-1字数: 1822000版次: 1页数: 845印刷时间: 2007/08/01开本:印次:纸张: 胶版纸I S B N : 9787121047442包装: 平装内容简介
本书是一本信息安全的经典著作和权威指南,内容新颖丰富。全书系统地描述了计算安全的各方面问题,内容涉及计算机安全的概念和术语;密码学基础及应用;程序及软件安全;操作系统安全及可信任操作系统的设计;数据库及数据挖掘的安全;网络安全;安全管理;计算机安全经济学;计算安全中的隐私问题;计算安全中的法律和道德问题,最后对密码学进行了深入研究。
本书既可以作为信息安全或计算机专业本科生、研究生的双语教材,也可以作为相关领域研究人员和专业技术人员的参考用书。
作者简介
Charles P.Pfleeger是一位独立的信息安全咨询师和Pfleeger顾问咨询集团的负责人。从事威胁、漏洞分析、系统设计评审、认证准备、专家鉴定和培训等。
目录
Chapter 1 Is There a Security Problem in Computing?
1.1What Does "Secure" Mean?
Protecting Valuables
Characteristics of Computer Intrusion
1.2Attacks
Vulnerabilities, Threats, Attacks, and Controls
Method, Opportunity, and Motive
1.3The Meaning of Computer Security
Security Goals
Vulnerabilities
1.4Computer Criminals
Amateurs
Crackers or Malicious Hackers
Career Criminals
Terrorists
1.5Methods of Defense
Controls
Effectiveness of Controls
1.6What's Next
Encryption Overview
Hardware and Software Security
Human Controls in Security
Encryption In-Depth
1.7Summary
1.8Terms and Concepts
1.9Where the Field Is Headed
1.10To Learn More
1.11Exercises
Chapter 2Elementary Cryptography
2.1Terminology and Background
Terminology
Representing Characters
2.2Substitution Ciphers
The Caesar Cipher
Other Substitutions
One-Time Pads
Summary of Substitutions
2.3Transpositions (Permutations)
Columnar Transpositions
Combinations of Approaches
2.4Making "Good" Encryption Algorithms
What Makes a "Secure" Encryption Algorithm?
Symmetric and Asymmetric Encryption Systems
Stream and Block Ciphers
Confusion and Diffusion
Cryptanaly$is--Breaking Encryption Schemes
2.5The Data Encryption Standard
Background and History
Overview of the DES Algorithm
Double and Triple DES
Security of the DES
2.6The AES Encryption Algorithm
The AES Contest
Overview of Rijndael
Strength of the Algorithm
Comparison of DES and AES
2.7Public Key Encryption
Motivation
Characteristics
Rivest-Shamir-Adelman (RSA) Encryption
……
Chapter3Program Security
Chapter4Protection in General-Purpose Operating Systems
Chapter5Designing Trusted Operating Systems
Chapter6Database and Data Mining Security
Chapter7Security in Networks
Chapter8Administering Security
Chapter9The Economics of Cybersecurity
Chapter10Privacy in Computing
Chapter11Legal and Ethical Issues in Computer Security
Chapter12Cryptography Explained
Bibliography
Index