Computer network security management [Paperback](Chinese Edition)
4 Angebote vergleichen

Preise201320142015
Schnitt 49,08 53,74 65,29
Nachfrage
Bester Preis: 43,01 (vom 27.10.2013)
1
GE XIU HUI

Computer network security management [Paperback](Chinese Edition) (2000)

Lieferung erfolgt aus/von: China, Volksrepublik NW

ISBN: 9787302068921 bzw. 7302068925, Sprache unbekannt, neu.

44,24 ($ 57,64)¹ + Versand: 13,82 ($ 18,00)¹ = 58,06 ($ 75,64)¹
unverbindlich
Lieferung aus: China, Volksrepublik, Versandkosten nach: DEU.
Von Händler/Antiquariat, cninternationalseller.
paperback. New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback Pages Number: 292 Language: Simplified Chinese Publisher: Tsinghua University Press; 1st edition (January 1. 2003) book is a thorough introduction to the knowledge of computer network security. content-rich. explain the layman. The book is divided into nine chapters. Chapter 1 describes the basics of network security; Chapter 2 describes in detail the knowledge of encryption technology; 3. 4. 5. respectively. the popular operating system Windows NT. Windows 2000 Server. and Linux network operating system security management. a detailed analysis and elaboration; Chapter 6. the e-mail service. security. and client and mail server security configuration for a detailed analysis; basic knowledge of Chapter 7 of the virus and virus check kill to do a special explanation; Chapter 8 of the firewall into the analysis. and configuration examples; Chapter 9 on e-commerce website security SSL protocol and its configuration of the site do a detailed analysis. Through the study of the book. readers can network security has a comprehensive and systematic understanding of network security tools. and can learn to use. The book is suitable for network administrators and information security management. either as institutions of higher learning information security professional teaching aids are also available in the relevant professional teaching staff. research and engineering and technical people with a reference. Contents: Contents Chapter 1 network security management infrastructure 1.1 network system structure Overview 1.2 Network Architecture Reference Model 1.2.1OSI reference 1.4.1 the model 1.2.2TCP/IP agreement structural system 1.3 System Security 1.4TCP/IP level security network layer security 1.4.2 Transport Layer Security 1.4.3 application layer security 1.5TCP/IP Services Security 1.5.1WWW services 1.5.2 E-mail the service 1.5.3FTP service and TFTP service 1.5.4Finger services 1.5.5 other services 1.6 Personal Network Security 1.7 LAN security 1.7.1 network segment 1.7.2. switching hubs instead of the shared hub 1.7.3 Virtual Private Networks 1.8 WAN's security 1.8.1 encryption technology 1.8.2VPN technology 1.8.3 Authentication Technology 1.9 network security threat to the function 1.11 Network Security 1.10 Network Security should have the main form of attack 1.11.1 key technologies of information gathering 1.11.2 technical loopholes type of attack 1.12 Network Security 1.13 to ensure network security network security policy in measures 1.14 1.14.1 1.14.2 The application program data defense defense 1.14.3 host defenses 1.14.4 network defense 1.14.5 perimeter defenses 1.14.6 physical security Chapter 2 encryption technology 2.1 2.2 Symmetric cryptographic algorithm encryption technology 2.2 .1 the DES algorithm 2.2.2 Triple DES algorithm 2.3 asymmetric encryption technology 2.4RSA algorithm About 2.4.1RSA algorithm 2.4.2 key pair generation of safe *** 2.4.4RSA 2.4.3RSA the speed of the chosen ciphertext attack 2.4.5RSA 2.4 .6 RSA digital signatures the 2.4.7RSA the shortcomings 2.4.8 safety assessment on the strength of the confidentiality of the RSA algorithm 2.4.9RSA practicality 2.5RSA algorithm and DES algorithm 2.6DSS/DSA algorithms 2.7 Elliptic Curve Cryptography 2.8 quantum encryption technology 2.9 2.10 Chapter 3. the smart card. the Windows NT network operating system security management 3.1WindowsNT 2.9.1 Certification Body of the PKI management system 2.9.2 2.9.3 Certificate Encryption Standard Standard 2.9.4 digital certificate security services of the security environment 3.2WindowsNT 3.2.1 verify 3.2 .2 Access Control 3.2.3 The responsibility for audit 3.2.4 3.2.5 security partition 3.2.6 integrity 3.2.7 the confidentiality of 3.2.8 can manageability 3.3WindowsNT. safe mode 3.3.1WindowsNT Security Policy 3.3.2 in the network WindowsNT security 3.4WindowsNTServer the safety management practical command 3.6.2netview3.6.3netuse Chapter 4. the safety of the Windows 2000 operating system create a secure Web site 3.5.1 install 3.5.2WindowsNT set 3.5.3IIS set 3.6 security tool 3.6.1nbtstat 3.5 based on WindowsNT authentication services architecture 4.3Windows2000 the the management 4.1Windows2000 security the design 4.2Windows2000 in security features 4.4Windows2000 Group Policy to manage security 4.4.1Windows2000 in Group Policy 4.4.2 to strengthen the built-in account security 4.4.3 Group Policy Security Templates 4.4 .4 group strategy 5.1.2 Authentication 4.5.1 Audit 4.5 Audit and Intrusion Detection 4.5.2 Security Management 5.1 System the security 5.1.1C1/C2 security Intrusion Detection 4.6 Patch Chapter 5 Linux network operating system-level design framework 5.1.4 storage space of the 5.1.3 user permissions and superuser security 5.1.5 Data encryption 5.1.6B1 security level to strengthen the 5.1.7 log 5.2 Network Security 5.2.1 network interface layer 5.2.2 Network Layer 5.2.3 Transport Layer 5.2 .4 Application Layer 5.3 security tools 5.3.1tcpserver5.3.2xinetd5.3.3Sudo5.3.4 security check tool nessus5.3.5 monitoring tool sniffit5.3.6 scan tool nmap5.3.7 other security tools 5.4 configuration secure and reliable the system 5.4.1SSH practice 5.4.2SSL 6.1 e-mail e-mail security management in Chapter 6 of the Practice 5.4.3 constructor chroot DNS5.4.4 proxy server socks5.4.5 mail server Overview 6.2 e-mail the agreement 6.2.1POP post office protocol 6.2.2IMAP interactive e-mail access protocol 6.2 the .3 SMTP Simple Mail Transfer Protocol 6.3 e-mail the way security 6.3.1Web page the way the 6.3.2 client to send and receive e-mail security 6.4 e-mail encryption tool 6.4.1A-Lock e-mail encryption software 6.4.2Puffer mail encryption tool 6.5Exchange the security configuration and management of the mail server 6.5.1 recipient the creation of Overview 7.1.1 Definition of computer viruses 7.1.2 virus 7.1.3 computer viruses and 7.1 of Chapter 7 of the configuration 6.5.2ExchangeServer monitoring computer virus computer virus 7.2 Common characteristics 7.1.4 virus classification 7.1.5 computer virus 7.1.6 computer viruses. destructive phenomenon several viruses 7.2.1CIH virus 7.2.2 Trojan 7.2.3 Macro viruses 7.2.4BO black hole virus 7.2.5 7.2.6CodeRed e-mail virus virus 7.2.7 Common virus attack Date Table 7.3 computer virus prevention and control strategies of detection 7.4 computer virus 7.5 virus detection methods 7.5.1 feature code method 7.5.2 7.5.3 checksum method behavioral surveillance law 7.5 .4 software simulation in Chapter 8 7.6.1 Duba of 7.6 commonly used anti-virus software antivirus software 7.6.2KV3000 kill virus software. firewall security management 8.1 Firewall Overview 8.1.1 firewall features 8.1.2 implement firewall technology 8.2 type of firewall 8.2 .1 network level firewall 8.2.2 application-level gateway firewall 8.2.3 Circuit-level gateway firewall 8.2.4 rule checking firewall 8.2.5 Status Monitor 8.3 Firewall architecture 8.3.1 The dual-homed host system structure 8.3.2 shielded host 8.4 Firewall architecture 8.3.3 screened subnet architecture 8.3.4 firewall architecture combination to select 8.5 common firewall configuration and management 8.5.1 configure Firewall 8.5.2 Firewall Management Chapter 9. e-commerce Web site security 9.1 Security Overview of e-commerce technology 9.2.2 9.1.1 e-commerce site's safety standards 9.1.2 9.2 e-commerce e-commerce security system 9.2.1 password of the security technology used in digital signature certification 9.3 9.3 e-commerce. Satisfaction guaranteed,or money back.
2
GE XIU HUI

Computer network security management [Paperback] (2000)

Lieferung erfolgt aus/von: Deutschland PB NW FE

ISBN: 9787302068921 bzw. 7302068925, Sprache unbekannt, Taschenbuch, neu, Erstausgabe.

45,59 + Versand: 13,82 = 59,41
unverbindlich
Von Händler/Antiquariat, liu xing [54261761], JiangSu, JS, China.
Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback Pages Number: 292 Language: Simplified Chinese Publisher: Tsinghua University Press; 1st edition (January 1. 2003) book is a thorough introduction to the knowledge of computer network security. content-rich. explain the layman. The book is divided into nine chapters. Chapter 1 describes the basics of network security; Chapter 2 describes in detail the knowledge of encryption technology; 3. 4. 5. respectively. the popular operating system Windows NT. Windows 2000 Server. and Linux network operating system security management. a detailed analysis and elaboration; Chapter 6. the e-mail service. security. and client and mail server security configuration for a detailed analysis; basic knowledge of Chapter 7 of the virus and virus check kill to do a special explanation; Chapter 8 of the firewall into the analysis. and configuration examples; Chapter 9 on e-commerce website security SSL protocol and its configuration of the site do a detailed analysis. Through the study of the book. readers can network security has a comprehensive and systematic understanding of network security tools. and can learn to use. The book is suitable for network administrators and information security management. either as institutions of higher learning information security professional teaching aids are also available in the relevant professional teaching staff. research and engineering and technical people with a reference. Contents: Contents Chapter 1 network security management infrastructure 1.1 network system structure Overview 1.2 Network Architecture Reference Model 1.2.1OSI reference 1.4.1 the model 1.2.2TCP/IP agreement structural system 1.3 System Security 1.4TCP/IP level security network layer security 1.4.2 Transport Layer Security 1.4.3 application layer security 1.5TCP/IP Services Security 1.5.1WWW services 1.5.2 E-mail the service 1.5.3FTP service and TFTP service 1.5.4Finger services 1.5.5 other services 1.6 Personal Network Security 1.7 LAN security 1.7.1 network segment 1.7.2. switching hubs instead of the shared hub 1.7.3 Virtual Private Networks 1.8 WAN's security 1.8.1 encryption technology 1.8.2VPN technology 1.8.3 Authentication Technology 1.9 network security threat to the function 1.11 Network Security 1.10 Network Security should have the main form of attack 1.11.1 key technologies of information gathering 1.11.2 technical loopholes type of attack 1.12 Network Security 1.13 to ensure network security network security policy in measures 1.14 1.14.1 1.14.2 The application program data defense defense 1.14.3 host defenses 1.14.4 network defense 1.14.5 perimeter defenses 1.14.6 physical security Chapter 2 encryption technology 2.1 2.2 Symmetric cryptographic algorithm encryption technology 2.2 .1 the DES algorithm 2.2.2 Triple DES algorithm 2.3 asymmetric encryption technology 2.4RSA algorithm About 2.4.1RSA algorithm 2.4.2 key pair generation of safe *** 2.4.4RSA 2.4.3RSA the speed of the chosen ciphertext attack 2.4.5RSA 2.4 .6 RSA digital signatures the 2.4.7RSA the shortcomings 2.4.8 safety assessment on the strength of the confidentiality of the RSA algorithm 2.4.9RSA practicality 2.5RSA algorithm and DES algorithm 2.6DSS/DSA algorithms 2.7 Elliptic Curve Cryptography 2.8 quantum encryption technology 2.9 2.10 Chapter 3. the smart card. the Windows NT network operating system security management 3.1WindowsNT 2.9.1 Certification Body of the PKI management system 2.9.2 2.9.3 Certificate Encryption Standard Standard 2.9.4 digital certificate security services of the security environment 3.2WindowsNT 3.2.1 verify 3.2 .2 Access Control 3.2.3 The responsibility for audit 3.2.4 3.2.5 security partition 3.2.6 integrity 3.2.7 the confidentiality of 3.2.8 can manageability 3.3WindowsNT. safe mode 3.3.1WindowsNT Security Policy 3.3.2 in the network WindowsNT security 3.4WindowsNTServer the safety management practical command.
3
GE XIU HUI

Computer network security management [Paperback](Chinese Edition) (2000)

Lieferung erfolgt aus/von: Deutschland PB NW FE

ISBN: 9787302068921 bzw. 7302068925, Sprache unbekannt, Taschenbuch, neu, Erstausgabe.

52,91 + Versand: 8,91 = 61,82
unverbindlich
Von Händler/Antiquariat, liu xing [54261761], JiangSu, JS, China.
Paperback Pages Number: 292 Language: Simplified Chinese Publisher: Tsinghua University Press; 1st edition (January 1. 2003) book is a thorough introduction to the knowledge of computer network security. content-rich. explain the layman. The book is divided into nine chapters. Chapter 1 describes the basics of network security; Chapter 2 describes in detail the knowledge of encryption technology; 3. 4. 5. respectively. the popular operating system Windows NT. Windows 2000 Server. and Linux ne.
4
GE XIU HUI

Computer network security management [Paperback](Chinese Edition) (2000)

Lieferung erfolgt aus/von: Vereinigte Staaten von Amerika PB US

ISBN: 9787302068921 bzw. 7302068925, Sprache unbekannt, Tsinghua University Press; 1 edition (January 1. 2003), Taschenbuch, gebraucht.

63,47 ($ 87,64)¹ + Versand: 2,89 ($ 3,99)¹ = 66,36 ($ 91,63)¹
unverbindlich
Lieferung aus: Vereinigte Staaten von Amerika, Usually ships in 1-2 business days.
Von Händler/Antiquariat, LoveChinaBook.
Die Beschreibung dieses Angebotes ist von geringer Qualität oder in einer Fremdsprache. Trotzdem anzeigen
Lade…