在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → Network Security: Private Communication in a Public World,

Network Security: Private Communication in a Public World,

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:7.31M
  • 下载次数:6
  • 浏览次数:154
  • 发布时间:2020-09-02
  • 实例类别:一般编程问题
  • 发 布 人:robot666
  • 文件格式:.pdf
  • 所需积分:2
 

实例介绍

【实例简介】
网络安全经典教材,第五版,pdf.是许多国外大学研究生的网络安全课的教材。
Section 10.2. On-Line Password Guessing Section 10.3. Off-Line Password Guessing Section 10. 4. How Big Should a Secret Be Section 10.5. eavesdropping Section 10.6. Passwords and Careless users Section 10.7 Initial Password distribution Section 10.8. Authentication Tokens Section 10.9. Physical Access Section 10.10, Biometrics Section 10.11. Homework Chapter 11. Security handshake Pitfalls Section 11.1. Login Only Section 11.2. Mutual authentication Section 11.3. Integrity/Encryption for Data Section 11.4. Mediated Authentication(with KDC) Section 11.5. Nonce Types Section 11.6. Picking random Numbers Section 11.7 Performance Considerations Section 11.8. Authentication Protocol checklist Section 119. Homework Chapter 12. Strong Password Protocols Section 12.1 Introduction Section 12.2. Lamport's hash Section 12.3. Strong Password Protocols Section 12. 4. Strong Password Credentials Download Protocols Section 12.5. Homework Part 3: Standard Chapter 13. Kerberos v4 Section 13.1. Introduction Section 13.2. Tickets and Ticket-Granting Tickets Section 13.3. Configuration Section 13. 4. Logging Into the Network Section 13.5. Replicated KDCs Section 13.6. Realms Section 13.7. Interrealm Authentication Section 13.8. Key Version Numbers Section 13. 9. Encryption for Privacy and Integrity Section 13.10. Encryption for Integrity only Section 13. 11. Network Layer Addresses in Tickets Section 13.12. Message Formats Section 13.13. Homework Chapter 14. Kerberos V5 Section 14.1 ASN.1 Section 14.2. Names Section 14.3. Delegation of Rights Section 14 4. Ticket Lifetimes Section 14.5. Key versions Section 14.6. Making Master Keys in Different Realms Different Section 14.7. Optimizations Section 14.8. Cryptographic Algorithms Section 14.9. Hierarchy of Realms Section 14.10. Evading Password-Guessing Attacks Section 14.11. Key Inside Authenticator Section 14.12. double t gT authentication Section 14.13. PKINITAPublic Keys for Users Section 14.14. KDC Database Section 14.15. Kerberos V5 Messages Section 14.16. Homework Chapter 15. PKI(Public Key Infrastructure Section 15.1. Introduction Section 15. 2. Some Terminology Section 153. PKI Trust models Section 15.4 Revocation Section 15.5. Directories and PKl Section 15.6. PKX and X509 Section15.7.×509 and pkⅨ Certificates Section 15.8. Authorization Futures Section 15.9. Homework Section 16.1. What Layer? hi Chapter 16. Real-Time Communication Security Section 16. 2. Session Key Establishment Section 16.3. Perfect Forward Secrecy Section 16. 4. PFS-Foilage Section 16.5. Denial-of-Service/Clogging Protection Section 16.6. Endpoint Identifier Hiding Section 16.7 Live Partner reassurance Section 16.8. Arranging for Parallel computation Section 16.9. Session Resumption Section 16.10. Plausible Deniability Section 16.11. Data Stream Protection Section 16. 12. Negotiating Crypto Parameters Section 16 13. Easy Homework Section 16 14. Homework Chapter 17. IPsec: AH and ESP Section 17.1. Overview of ipsec Section 17.2.P and IPv6 Section 17.3. AH (Authentication Header) Section 17.4. ESP(Encapsulating Security Payload) Section 175. So, Do We need ah? Section 17.6. Comparison of Encodings Section 17. 7. Easy Homework Section 17. 8. Homework Chapter 18. IPsec: KE Section 18. 1. Photuris Section 18.2, SKIP Section 18. 3. History of IKE Section 18.4.KE Phases Section 18,5. Phase 1 IKE Section 18.6. Phase-2 IKE: Setting up IPsec SAs Section 18.7. ISAKMP/IKE Encoding Section 18.8. Homework Chapter 19. SSL/TLS Section 19.1 Introduction Section 19.2. Using TCP Section 19.3. Quick History Section 19.4, SSL/TLS Basic Protocol Section 19.5. Session Resumption Section 19.6. Computing the Keys Section 19.7. Client Authentication Section 19.8. PKI as Deployed by SSL Section 19.9, Version numbers Section 19.10. Negotiating Cipher Suites Section 19.11. Negotiating Compression Method Section 19.12 Attacks fixed in v 3 Section 19 13. Exportability Section 19 14. Encoding Section 19.15. Further Reading Section 19 16. Easy Homework Section 19.17 Homework Part 4: Electronic mail Chapter 20. Electronic Mail Security Section 20.1 Distribution Lists Section 20.2. Store and forward Section 20.3. Security Services for Electronic Mail Section 20. 4. Establishing Keys Section 20.5. Privacy Section 20.6. Authentication of the source Section 20.7. Message Integrity Section 20.8. Non-Repudiation Section 20. 9. Proof of submission Section 20. 10. Proof of Delivery Section 20.11. Message Flow Confidentiality Section 20. 12. Anonymity Section 20.13. Containment Section 20. 14. Annoying Text Format Issues Section 20.15. Names and addresses Section 20.16. Verifying When a Message was Really Sent Section 20.17 Homework Chapter 21. PEM&S/MIME Section 21.1, Introduction Section 21.2. Structure of a PEM Message Section 21.3. Establishing Keys Section 21. 4. Some PEM History Section 21.5. PEM Certificate Hierarchy Section 21.6. Certificate Revocation Lists(CRLs Section 21.7. Reformatting data to Get Through mailers Section 21.8. General Structure of a PEM message Section 21.9. Encryption Section 21. 10. Source Authentication and Integrity Protection Section 21.11. Multiple Recipients Section 21.12. Bracketing PEM Messages Section 21.13. Forwarding and Enclosures Section 21.14. Unprotected Information Section 21.15. Message Formats Section 21.16. DES-CBC as mic doesnt Work Section 21.17 Differences in s/mime Section 21.18. S/MIME Certificate Hierarchy Section 21.19. Homework Chapter 22. PGP(Pretty Good Privacy Section 22.1 Introduction Section 22.2 Overview Section 22. 3. Key Distribution Section 22. 4. Efficient Encoding Section 22.5. Certificate and Key Revocation Section 22.6. Signature Types Section 22.7. Your Private Key Section 22.8. Key Rings Section 22. 9. Anomalies Section 22. 10. Object Formats Part 5: Leftovers Chapter 23. Firewalls Section 23.1. Packet filters Section 23.2. Application Level Gateway Section 23. 3. Encrypted Tunnels Section 23. 4. Comparisons Section 23.5. Why Firewalls Don ' t Work Section 23. 6. Denial-of-Service Attacks Section 23.7. Should Firewalls Go Away Chapter 24. More Security Systems Section 24.1. Netware v3 Section 242. NetWare v4 Section 24. 3. KryptoKnight Section 24, 4. DASS/SPX Section 24.5. Lotus Notes Security Section 24.6. DCE Security Section 24. 7. Microsoft Windows Security Section 24.8. Network denial of service Section 24.9. Clipper Section 24. 10. Homework Chapter 25. Web Issues Section 25.1. Introduction Section 25.2. URLS/URIs Section 25.3. Http SEction 25. 4. Http Digest Authentication Section 25.5. Cookies Section 25.6. Other Web security Problems Section 25.7 Homework Chapter 26. Folklore Section 26. 1. Perfect Forward Secrecy Section 26. 2. Change Keys Periodically Section 26.3. Multiplexing Flows over a Single SA Section 26. 4. Use Different Keys in the two directions Section 26.5. Use Different Secret Keys for Encryption Vs Integrity Protection Section 26.6. Use Different Keys for Different Purposes Section 26.7. Use Different Keys for Signing VS. Encryption Section 26.8. Have Both Sides Contribute to the Master Key Section 26. 9. Don't Let One Side Determine the Key Section 26.10. Hash in a Constant When Hashing a Password Section 26. 11. HMAC Rather than Simple MD Section 26. 12. Key Expansion Section 26.13. Randomly Chosen IVs Section 26.14. Use of nonces in protocols Section 26. 15. Dont Let Encrypted Data Begin with a Constant Section 26.16. Don' t Let Encrypted data begin with a predictable value Section 26. 17. Compress Data Before Encrypting It Section 26. 18. Don' t Do Encryption Only Section 26. 19. Avoiding Weak Keys Section 26.20. Minimal vs Redundant Designs Section 26. 21. Overestimate the Size of Key Section 26.22. Hardware Random number generators Section 26.23. Timing Attacks Section 26.24. Put checksums at the end of data Section 26.25. Forward Compatibility Section 26.26. Negotiating Parameters Section 26.27. Homework Bibliography G Index T [Team Unknown I Networking Security Networking Security Networking SecuritySecurity Networking Security Networking Security Networking Charlie Kaufman Radia Perlman Mike Speciner Prentice Hall Network Security: Private Communication in a Public World, Second Edition Copyright Editorial/Production Supervision: Faye Gemmellaro Executive Editor: Mary franz Editorial Assistant: noreen regina Marketing Manager: Dan DePasquale Manufacturing Buyer: Maura Zaldivar Cover lllustration Tom post Cover Design Director: Jerry Votta c 2002 by prentice Hall PTR adivision of pearson education Inc Upper Saddle River, New Jersey 07458 Prentice Hall books are widely used by corporations and government agencies for training marketing, and resale For information regarding corporate and government bulk discounts, please contact: Corporate andGovernmentSales,(800)382-3419,orcorpsales@pearsontechgroup.com All rights reserved No part of this book may be reproduced, in any form or by any means, without permission in writing from the publisher All trademarks mentioned herein are the properties of their respective owners Printed in the United States of america 109876543 2 Second Printing Pearson education ltd Pearson education australia pty ltd Pearson Education Singapore, Pte Ltd Pearson Education north asia ltd Pearson education canada ltd Pearson Educacion de mexico. S.A. decv Pearson EducationAJapan Pearson Education Malaysia, Pte. Ltd Dedication Si spy net work big fedjiaw iog link kyxogy [Team Unknown I Networking Security Networking Security Networking SecuritySecurity Networking Security Networking Security Networking Charlie Kaufman Radia Perlman Mike Speciner Prentice Hall Network Security: Private Communication in a Public World, Second Edition The Radia Perlman Series in Computer Networking and Security Radia perlman. series editor Dusseault WebDAv Next-Generation Collaborative Web Authoring Hellberg boyes, and Broadband Network architectures Greene Designing and Deploying Triple Play services Kaufman, Perlman, and Network Security: Private Speciner Communication in a Public Word Second Edition Liska The Practice of Network Security Deployment Strategies for Production environments Mandil Linux Routers A Primer for Network administrators. second Edition Maufer A Field guide to wireless lANs for Administrators and Power users Mirkovic. Dietrich. Dittrich, Internet Denia/ of service Attack and reiher and Defense mechanisms Skoudis with liston Counter Hack Reloaded: A Step-by- Step Guide to Computer Attacks and effective Defenses. Second Edition skoudis with Zeltser Malware: Fighting Malicious Code Solomon Mobile /P: The Internet Unplugged Syme and Goldie Optimizing Network Performance with Content Switching: Server, Firewall and cache load Balancing Tomsu and schmutzer Next Generation Optical Networks [Team Unknown I Networking Security Networking Security Networking SecuritySecurity Networking Security Networking Security Networking Charlie Kaufman Radia Perlman Mike Speciner Prentice Hall Network Security: Private Communication in a Public World, Second Edition Acknowledgments Despite the controversies that crop up around security issues, it has been our experience that people in the security community are generally generous with their wisdom and time. It's always a little scary thanking specific people, for fear we ' ll leave someone out, but leaving everyone out seems wrong. It's not even the fair thing to do since some people would be more egregiously wronged by being left out than others Eric Rescorla and Hilarie Orman have been particularly helpful with answering questions and reviewing chapters for this edition. Other reviewers, and people who have been helpful answering questions, include Tom Wu, Kevin Fu, Marshall Rose, Joe Tardo, Joe Pato, Seth Proctor, Timothy Spiller, Tom Rice, Kristen McIntyre, Gary winiger, Dan Harkins, Peter Kent, John Linn, Steve Hanna, Jim Bidzos Dave Jablon, Ted Ts'o, Matthew Barnes, Keithve Memishian, Jeff Schiller, Burt Kaliski, Tony Lauck, Phil Karn, Ron Rivest, Steve Crocker, Stev McCloughrie, Jeffrey Case, Kathrin Winkler, Philippe auphelle, Sig Handelman, Phillip hallam- Baker, Uri Blumenthal, Serge Vaudenay, and boyd roberts We could not have done Chapter 24 more Security Systems without help from the various companies involved, since for the most part the security systems were previously undocumented We'd like to thank Al Eldridge from Iris(lotus Notes), Amir Herzberg and mark Davis from IBM (Kryptoknight), Walt Tuvell from OSF, and Cliff Van Dyke from Microsoft (LAN Manager and Windows NT security ) for explaining their systems to us, doing timely reviews of what we wrote, and being enthusiastic and supportive of the project. Although nearly 67%of us work for companies that have products in this area, the opinions we offer are ours alone and not those of our companies Mary Franz, our editor at Prentice Hall, has been enthusiastic and optimistic and patient with us throughout. She's shown good judgment about when to be helpful, when to keep out of the way, when to nag, and when to just look soulful so we feel guilty enough to meet a deadline Despite the fact that this book has kept both of his parents busy for a significant part of his life Ray perNer has kept us inspired with his wholehearted and unselfish enthusiasm for the project. He's shown genuine interest in the subject matter, offered useful advice during interauthor arguments, helped search for quotes, reviewed part of the book, and particularly liked the subscripted pronouns. If we overdo those, it's just because it's fun to see him giggle Dawn Perner has also been a great supporter of the project, and manages to convince a surprising number of her friends, as well as complete strangers, to buy the book And of course we thank you, our reader. We welcome your comments and suggestions Compliments are always welcome. We hope to update the book periodically, so if there are topics you wish wed covered or errors you' d like us to correct, let us know Errata can be foundathttp://www.phptr.com/networksecurity. Ourcurrentemailaddressesarekaufman@us.ibm.com,radia@alum.mit.edu,and ms(alum. mit. edu. But we've found that email is not always reliable and email addresses change. If all else fails, you can contact the publisher, Prentice Hall, particularly our editor Mary Franz(franz@prenhall com), and find out our current addresses We wish to thank the following for their permission to use their quotes in this book Quote on page 10 from The Hollywood Book of Quotes, Omnibus Press 【实例截图】
【核心代码】

标签:

实例下载地址

Network Security: Private Communication in a Public World,

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警