Stock Image

Information Security Technology (general higher education Eleventh Five national planning materials)

CHEN MING

ISBN 10: 7302145113 / ISBN 13: 9787302145110
New Condition: New Soft cover
From liu xing (JiangSu, JS, China)

AbeBooks Seller Since 07 April 2009 Seller Rating 5-star rating

Quantity Available: 10

Buy New
Price: 41.68 Convert Currency
Shipping: Free From China to U.S.A. Destination, rates & speeds
Add to basket

About this Item

Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Pages Number: 223 Publisher: Tsinghua University. Pub. Date :2007-04-01 version 1. This book introduces the school system. the information security aspects. the main contents of the information security infrastructure. basic cryptography. mathematical foundations. public-key cryptography. database security. network security. digital signatures and authentication mechanisms. examples of computer virus and information security. Book selection refining the concept of narrative clear focus on practical. logical. together with a large number of exercises. easy to learn to understand and master. This book can be used as computer science and related professional institutions of higher learning teaching materials. computer technology can be used as the reference staff. Contents: Chapter 1 Introduction 1.1 Information security issues raised 1.2 pairs of information. kinds of threats and attacks. information leakage 1.2.2 1.2.1 1.2.3 damage to computer crime information computer virus 1.3 1.2.4 1.4 cryptography security of important information of information security tasks 1.5 1.6 countermeasures for information security information security measures 1.6.1 1.6.2 1.7 Summary of information security measures Exercises Chapter 2 Information security infrastructure 2.1 Information 2.1.1 physical insecurity. insecurity 2.1. 2.1.3 System 2 network insecurity insecurity insecurity 2.2 Information Management 2.1.4 2.2.1 password attack address spoofing attack 2.2.2 2.2.3 2.2.5 veto wiretap 2.2.4 Business Link 2.2.6 for theft Domain Name System 2.2.7 damage to infrastructure such as damage to the database using web 2.3 Demand Analysis 2.3.1 Information Security Operational Safety Protection Safety 2.3.2 2.3.3 2.3.4 Safety assessment of safety management and Technical Analysis 2.4 Safety 2.4.1 Theoretical Cryptography 2.4.2 with data encryption technology certified wood identification theory and technology 2.4.3 authorization and access control theory and technology of audit trail technology 2.4.5 2.4.4 isolation and access to the proxy gateway anti-virus technology 2.4.7 Technology 2.4.6 Intrusion Detection 2.4.8 Technology 2.5 network security technology utilization level of security and security-level analysis of the model 2.5.1 2.5.2 2.6 security model Chapter 3 Summary Exercises based Cryptography 3.1 Cryptography Cryptography Overview 3.1.1 emergence and development of 3.1. 2 password password algorithm academic language 3.1.3 3.1.4 3.2 password encoding learn cryptography cryptanalysis 3.4 3.3 instead of the password and cipher instead of the password 3.4.2 3.4.1 3.5 cipher and block cipher stream cipher sequence 3.5.1 Password 3.5.2 3.6 block cipher stream cipher stream cipher 3.6.1 Overview 3.6.2 Chaos 3.6.3 chaotic stream cipher sequence 3.7 Summary Exercises Chapter 4. public-key cryptosystem 4.1 Overview of public key cryptography encryption algorithm 4.3 4.2 index knapsack algorithm 4.4 RSA algorithm for elliptic curve cryptography algorithm 4.5 4.6 4.7 Summary Exercises probabilistic encryption Chapter 5 Database Security Database Security 5.1 Overview 5.1.1 database security threats faced by the importance of database security 5.1.2 5.1.3 5.1.4 database. the confidentiality of the database 5.2 Database system security requirements and security assessment security policy database security policy 5.2.1 5.2.2 5.3 database security database security model evaluation 5.4 5.5 database technology. database security database encryption encryption 5.5.1 5.5.2 need the basic requirements of 5.5 .3 database encryption system issues related to an encryption technology 5.5.4 5.5.5 5.5.6 key encryption algorithm 5.6 Summary Exercises Chapter 6 Computer Network Security 6.1 Network model and security analysis 6.1.1 OSI network model 6.1.2 TCP / IP model and OSI model 6.1.3 TCP / IP network protocol insecurity 6.2 6.2.1 6.2.2 Network security f. Bookseller Inventory # LQ1016

Ask Seller a Question

Bibliographic Details

Title: Information Security Technology (general ...

Binding: paperback

Book Condition: New

About this title

Synopsis:

Paperback. Pub Date: 2007 Pages: 223 Publisher: Tsinghua University Press Ordinary Higher Education Eleventh Five-Year national planning materials: information security technology school system introduced about the content of the information security main content information security based on the basis of cryptography. mathematical foundations. public-key cryptography. database security. network security. digital signature and authentication mechanisms. computer viruses. and information security example. Ordinary higher education Eleventh Five-Year national planning materials: information security technology selection refining the concept of narrative clear focus on practical. logical and strong. with a large number of exercises. easy to learn to understand and grasp. Regular higher education Eleventh Five-Year national planning materials: information security technology as ...

"About this title" may belong to another edition of this title.

Store Description

Thank you for visiting My bookstore! We are an online bookstore, and Is the China's largest online book sales. Generally our books are from China, with reasonable price and decent printing quality. We are always trying our best to satisfy customer's needs!

Visit Seller's Storefront

Terms of Sale:

We guarantee the condition of every book as it's described on the Abebooks web sites. If you're dissatisfied with your purchase (Incorrect Book/Not as Described/Damaged) or if the order hasn't arrived, you're eligible for a refund within 30 days of the estimated delivery date. If you've changed your mind about a book that you've ordered, please use the Ask bookseller a question link to contact us and we'll respond within 2 business days. Please Note:We don't sell any international Edition to you...

More Information
Shipping Terms:

Most orders are shipped within 24 hours. We will delivery these items to you by AIRMAIL, EUB, EMS, TNT etc.

List this Seller's Books

Payment Methods
accepted by seller

Visa Mastercard American Express

PayPal Bank/Wire Transfer