开启辅助访问 购买速递币 快速注册 找回密码 切换风格

科研速递论坛

104

主题

1

好友

5

积分

渐入佳境

Rank: 3Rank: 3

科研币
0
速递币
16586
娱乐币
4442
文献值
649
资源值
0
贡献值
0
跳转到指定楼层
楼主
发表于 2019-9-11 01:19:51 |只看该作者 |倒序浏览
速递书局
封面:
题名: Introduction to network security
作者: Douglas Jacobson
出版社: CRC press
出版日期: 2008-11-14
ISBN: 1584885432
附属页: 齐全
书签:
格式: 清晰PDF
内容简介: Unlike data communications of the past, today’s networks consist of numerous devices that handle the data as it passes from the sender to the receiver. However, security concerns are frequently raised in circumstances where interconnected computers use a network not controlled by any one entity or organization. Introduction to Network Security examines various network protocols, focusing on vulnerabilities, exploits, attacks, and methods to mitigate an attack.

The book begins with a brief discussion of network architectures and the functions of layers in a typical network. It then examines vulnerabilities and attacks divided into four categories: header-, protocol-, authentication-, and traffic-based. The author next explores the physical, network, and transport layers of each network as well as the security of several common network applications. The last section recommends several network-based security solutions that can be successfully deployed.

This book uses a define-attack-defend methodology for network security. The author briefly introduces the relevant protocols and follows up with detailed descriptions of known vulnerabilities and possible attack methods. He delineates the threats against the protocol and presents possible solutions. Sample problems and lab experiments based on the concepts allow readers to experiment with attacks and assess the effectiveness of solutions. Two appendices provide further clarification and a companion website is offered which supplements the material.

While most of the books available on this subject focus solely on cryptographic techniques to mitigate attacks, this volume recognizes the limitations of this methodology and considers a wider range of security problems and solutions. By focusing on a practical view of network security and examining actual protocols, readers can better understand the vulnerabilities and develop appropriate countermeasures.
求助帖链接: http://www.expaper.cn/forum.php?mod=viewthread&tid=236784&extra=page%3D1

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?快速注册

您需要登录后才可以回帖 登录 | 快速注册

发布主题 !fastreply! 返回列表 官方QQ群

QQ|Translate Forum into English|QQ群:821993|Archiver|手机版|申请友链| 科研速递论坛

GMT+8, 2024-11-13 14:40 , Processed in 0.061246 second(s), 29 queries .

© 2012-2099 www.expaper.cn

!fastreply! 回顶部 !return_list!