计算机安全导论 英文PDF电子书下载
- 电子书积分:17 积分如何计算积分?
- 作 者:(美)古德里奇,(美)塔玛萨著
- 出 版 社:北京:清华大学出版社
- 出版年份:2013
- ISBN:9787302307198
- 页数:556 页
1 Introduction 1
1.1 Fundamental Concepts 2
1.1.1 Confidentiality,Integrity,and Availability 3
1.1.2 Assurance,Authenticity,and Anonymity 9
1.1.3 Threats and Attacks 14
1.1.4 Security Principles 15
1.2 Access Control Models 19
1.2.1 Access Control Matrices 19
1.2.2 Access Control Lists 20
1.2.3 Capabilities 22
1.2.4 Role-Based Access Control 23
1.3 Cryptographic Concepts 25
1.3.1 Encryption 25
1.3.2 Digital Signatures 31
1.3.3 Simple Attacks on Cryptosystems 32
1.3.4 Cryptographic Hash Functions 35
1.3.5 Digital Certificates 37
1.4 Implementation and Usability Issues 39
1.4.1 Efficiency and Usability 39
1.4.2 Passwords 41
1.4.3 Social Engineering 43
1.4.4 Vulnerabilities from Programming Errors 44
1.5 Exercises 46
2 Physical Security 55
2.1 Physical Protections and Attacks 56
2.2 Locks and Safes 57
2.2.1 Lock Technology 57
2.2.2 Attacks on Locks and Safes 62
2.2.3 The Mathematics of Lock Security 68
2.3 Authentication Technologies 71
2.3.1 Barcodes 71
2.3.2 Magnetic Stripe Cards 72
2.3.3 Smart Cards 74
2.3.4 RFIDs 79
2.3.5 Biometrics 83
2.4 Direct Attacks Against Computers 88
2.4.1 Environmental Attacks and Accidents 88
2.4.2 Eavesdropping 89
2.4.3 TEMPEST 94
2.4.4 Live CDs 96
2.4.5 Computer Forensics 96
2.5 Special-Purpose Machines 99
2.5.1 Automated Teller Machines 99
2.5.2 Voting Machines 101
2.6 Physical Intrusion Detection 103
2.6.1 Video Monitoring 103
2.6.2 Human Factors and Social Engineering 105
2.7 Exercises 106
3 Operating Systems Security 113
3.1 Operating Systems Concepts 114
3.1.1 The Kernel and Input/Output 115
3.1.2 Processes 116
3.1.3 The Filesystem 121
3.1.4 Memory Management 124
3.1.5 Virtual Machines 128
3.2 Process Security 130
3.2.1 Inductive Trust from Start to Finish 130
3.2.2 Monitoring,Management,and Logging 132
3.3 Memory and Filesystem Security 136
3.3.1 Virtual Memory Security 136
3.3.2 Password-Based Authentication 137
3.3.3 Access Control and Advanced File Permissions 140
3.3.4 File Descriptors 146
3.3.5 Symbolic Links and Shortcuts 148
3.4 Application Program Security 149
3.4.1 Compiling and Linking 149
3.4.2 Simple Buffer Overflow Attacks 150
3.4.3 Stack-Based Buffer Overflow 152
3.4.4 Heap-Based Buffer Overflow Attacks 159
3.4.5 Format String Attacks 162
3.4.6 Race Conditions 163
3.5 Exercises 166
4 Malware 173
4.1 Insider Attacks 174
4.1.1 Backdoors 174
4.1.2 Logic Bombs 177
4.1.3 Defenses Against Insider Attacks 180
4.2 Computer Viruses 181
4.2.1 Virus Classification 182
4.2.2 Defenses Against Viruses 185
4.2.3 Encrypted Viruses 186
4.2.4 Polymorphic and Metamorphic Viruses 187
4.3 Malware Attacks 188
4.3.1 Trojan Horses 188
4.3.2 Computer Worms 190
4.3.3 Rootkits 195
4.3.4 Zero-Day Attacks 199
4.3.5 Botnets 200
4.4 Privacy-Invasive Software 202
4.4.1 Adware 202
4.4.2 Spyware 204
4.5 Countermeasures 208
4.5.1 Best Practices 208
4.5.2 The Impossibility of Detecting All Malware 211
4.5.3 The Malware Detection Arms Race 213
4.5.4 Economics of Malware 214
4.6 Exercises 215
5 Network Security Ⅰ 221
5.1 Network Security Concepts 222
5.1.1 Network Topology 222
5.1.2 Internet Protocol Layers 223
5.1.3 Network Security Issues 227
5.2 The Link Layer 229
5.2.1 Ethernet 229
5.2.2 Media Access Control(MAC)Addresses 232
5.2.3 ARP Spoofing 233
5.3 The Network Layer 236
5.3.1 IP 236
5.3.2 Internet Control Message Protocol 240
5.3.3 IP Spoofing 242
5.3.4 Packet Sniffing 244
5.4 The Transport Layer 246
5.4.1 Transmission Control Protocol(TCP) 246
5.4.2 User Datagram Protocol(UDP) 250
5.4.3 Network Address Translation(NAT) 251
5.4.4 TGP Session Hijacking 253
5.5 Denial-of-Service Attacks 256
5.5.1 ICMP Attacks 256
5.5.2 SYN Flood Attacks 258
5.5.3 Optimistic TCP ACK Attack 260
5.5.4 Distributed Denial-of-Service 261
5.5.5 IP Traceback 262
5.6 Exercises 264
6 Network Security Ⅱ 269
6.1 The Application Layer and DNS 270
6.1.1 A Sample of Application-Layer Protocols 270
6.1.2 The Domain Name System(DNS) 271
6.1.3 DNS Attacks 278
6.1.4 DNSSEC 285
6.2 Firewalls 287
6.2.1 Firewall Policies 288
6.2.2 Stateless and Stateful Firewalls 289
6.3 Tunneling 292
6.3.1 Secure Shell(SSH) 293
6.3.2 IPsec 294
6.3.3 Virtual Private Networking(VPN) 297
6.4 Intrusion Detection 299
6.4.1 Intrusion Detection Events 302
6.4.2 Rule-Based Intrusion Detection 305
6.4.3 Statistical Intrusion Detection 306
6.4.4 Port Scanning 308
6.4.5 Honeypots 312
6.5 Wireless Networking 313
6.5.1 Wireless Technologies 314
6.5.2 Wired Equivalent Privacy(WEP) 315
6.5.3 Wi-Fi Protected Access(WPA) 318
6.6 Exercises 322
7 Web Security 327
7.1 The World Wide Web 328
7.1.1 HTTP and HTML 328
7.1.2 HTTPS 334
7.1.3 Dynamic Content 339
7.1.4 Sessions and Cookies 342
7.2 Attacks on Clients 347
7.2.1 Session Hijacking 347
7.2.2 Phishing 349
7.2.3 Click-Jacking 351
7.2.4 Vulnerabilities in Media Content 352
7.2.5 Privacy Attacks 356
7.2.6 Cross-Site Scripting(XSS) 357
7.2.7 Cross-Site Request Forgery(CSRF) 364
7.2.8 Defenses Against Client-Side Attacks 366
7.3 Attacks on Servers 368
7.3.1 Server-Side Scripting 368
7.3.2 Server-Side Script Inclusion Vulnerabilities 370
7.3.3 Databases and SQL Injection Attacks 372
7.3.4 Denial-of-Service Attacks 378
7.3.5 Web Server Privileges 379
7.3.6 Defenses Against Server-Side Attacks 380
7.4 Exercises 382
8 Cryptography 387
8.1 Symmetric Cryptography 388
8.1.1 Attacks 389
8.1.2 Substitution Ciphers 391
8.1.3 One-Time Pads 393
8.1.4 Pseudo-Random Number Generators 395
8.1.5 The Hill Cipher and Transposition Ciphers 397
8.1.6 The Advanced Encryption Standard(AES) 399
8.1.7 Modes of Operation 402
8.2 Public-Key Cryptography 406
8.2.1 Modular Arithmetic 406
8.2.2 The RSA Cryptosystem 410
8.2.3 The Elgamal Cryptosystem 413
8.2.4 Key Exchange 415
8.3 Cryptographic Hash Functions 417
8.3.1 Properties and Applications 417
8.3.2 Birthday Attacks 419
8.4 Digital Signatures 421
8.4.1 The RSA Signature Scheme 422
8.4.2 The Elgamal Signature Scheme 423
8.4.3 Using Hash Functions with Digital Signatures 424
8.5 Details of AES and RSA Cryptography 425
8.5.1 Details for AES 425
8.5.2 Details for RSA 431
8.6 Exercises 439
9 Security Models and Practice 445
9.1 Policy,Models,and Trust 446
9.1.1 Security Policy 446
9.1.2 Security Models 447
9.1.3 Trust Management 448
9.2 Access-Control Models 450
9.2.1 The Bell-La Padula Model 450
9.2.2 Other Access-Control Models 454
9.2.3 Role-Based Access Control 456
9.3 Security Standards and Evaluation 460
9.3.1 Orange Book and Common Criteria 460
9.3.2 Government Regulations and Standards 462
9.4 Software Vulnerability Assessment 464
9.4.1 Static and Dynamic Analysis 465
9.4.2 Exploit Development and Vulnerability Disclosure 468
9.5 Administration and Auditing 470
9.5.1 System Administration 470
9.5.2 Network Auditing and Penetration Testing 473
9.6 Kerberos 475
9.6.1 Kerberos Tickets and Servers 475
9.6.2 Kerberos Authentication 476
9.7 Secure Storage 479
9.7.1 File Encryption 479
9.7.2 Disk Encryption 481
9.7.3 Trusted Platform Module 482
9.8 Exercises 484
10 Distributed-Applications Security 487
10.1 Database Security 488
10.1.1 Tables and Queries 489
10.1.2 Updates and the Two-Phase Commit Protocol 491
10.1.3 Database Access Control 493
10.1.4 Sensitive Data 497
10.2 Email Security 500
10.2.1 How Email Works 500
10.2.2 Encryption and Authentication 502
10.2.3 Spam 507
10.3 Payment Systems and Auctions 513
10.3.1 Credit Cards 513
10.3.2 Digital Cash 516
10.3.3 Online Auctions 518
10.4 Digital-Rights Management 519
10.4.1 Digital-Media Rights Techniques 520
10.4.2 Digital-Media Rights Practice 523
10.4.3 Software Licensing Schemes 525
10.4.4 LegalIssues 527
10.5 Social Networking 528
10.5.1 Social Networks as Attack Vectors 528
10.5.2 Privacy 529
10.6 Voting Systems 531
10.6.1 Security Goals 531
10.6.2 ThreeBallot 532
10.7 Exercises 535
- 《计算机网络与通信基础》谢雨飞,田启川编著 2019
- 《大学计算机实验指导及习题解答》曹成志,宋长龙 2019
- 《计算机辅助平面设计》吴轶博主编 2019
- 《计算机组成原理解题参考 第7版》张基温 2017
- 《云计算节能与资源调度》彭俊杰主编 2019
- 《物联网导论》张翼英主编 2020
- 《Helmholtz方程的步进计算方法研究》李鹏著 2019
- 《材料导论》张会主编 2019
- 《化工传递过程导论 第2版》阎建民,刘辉 2020
- 《计算机组成原理 第2版》任国林 2018
- 《SQL与关系数据库理论》(美)戴特(C.J.Date) 2019
- 《魔法销售台词》(美)埃尔默·惠勒著 2019
- 《看漫画学钢琴 技巧 3》高宁译;(日)川崎美雪 2019
- 《优势谈判 15周年经典版》(美)罗杰·道森 2018
- 《社会学与人类生活 社会问题解析 第11版》(美)James M. Henslin(詹姆斯·M. 汉斯林) 2019
- 《海明威书信集:1917-1961 下》(美)海明威(Ernest Hemingway)著;潘小松译 2019
- 《迁徙 默温自选诗集 上》(美)W.S.默温著;伽禾译 2020
- 《上帝的孤独者 下 托马斯·沃尔夫短篇小说集》(美)托马斯·沃尔夫著;刘积源译 2017
- 《巴黎永远没个完》(美)海明威著 2017
- 《剑桥国际英语写作教程 段落写作》(美)吉尔·辛格尔顿(Jill Shingleton)编著 2019
- 《大学计算机实验指导及习题解答》曹成志,宋长龙 2019
- 《指向核心素养 北京十一学校名师教学设计 英语 七年级 上 配人教版》周志英总主编 2019
- 《大学生心理健康与人生发展》王琳责任编辑;(中国)肖宇 2019
- 《大学英语四级考试全真试题 标准模拟 四级》汪开虎主编 2012
- 《大学英语教学的跨文化交际视角研究与创新发展》许丽云,刘枫,尚利明著 2020
- 《北京生态环境保护》《北京环境保护丛书》编委会编著 2018
- 《复旦大学新闻学院教授学术丛书 新闻实务随想录》刘海贵 2019
- 《大学英语综合教程 1》王佃春,骆敏主编 2015
- 《大学物理简明教程 下 第2版》施卫主编 2020
- 《指向核心素养 北京十一学校名师教学设计 英语 九年级 上 配人教版》周志英总主编 2019