找到
3
篇与
Computer Science
相关的结果
-
Test Bank for Network Security Essentials Applications and Standards, 5/E 5th Edition William Stallings You are buying Test Bank for Network Security Essentials Applications and Standards, 5/E 5th Edition William Stallings Product details: Intended for college courses and professional readers where the interest is primarily in the application of network security, without the need to delve deeply into cryptographic theory and principles (system engineer, programmer, system manager, network manager, product marketing personnel, system support specialist). A practical survey of network security applications and standards, with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. Network Security: Applications and Standards , Fifth Edition provides a practical survey of network security applications and standards, with an emphasis on applications that are widely used on the Internet and for corporate networks. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. Table of contents: Online ResourcesPrefaceAbout the AuthorChapter 1 Introduction 1.1 Computer Security Concepts1.2 The OSI Security Architecture1.3 Security Attacks1.4 Security Services1.5 Security Mechanisms1.6 A Model for Network Security1.7 Standards1.8 Outline of This Book1.9 Recommended Reading1.10 Internet and Web Resources1.11 Key Terms, Review Questions, and ProblemsPART ONE CRYPTOGRAPHYChapter 2 Symmetric Encryption and Message Confidentiality 2.1 Symmetric Encryption Principles2.2 Symmetric Block Encryption Algorithms2.3 Random and Pseudorandom Numbers2.4 Stream Ciphers and RC42.5 Cipher Block Modes of Operation2.6 Recommended Reading2.7 Key Terms, Review Questions, and ProblemsChapter 3 Public-Key Cryptography and Message Authentication 3.1 Approaches to Message Authentication3.2 Secure Hash Functions3.3 Message Authentication Codes3.4 Public Key Cryptography Principles3.5 Public-Key Cryptography Algorithms3.6 Digital Signatures3.7 Recommended Reading3.8 Key Terms, Review Questions, and ProblemsPART TWO NETWORK SECURITY APPLICATIONSChapter 4 Key Distribution and User Authentication 4.1 Symmetric Key Distribution Using Symmetric Encryption4.2 Kerberos4.3 Key Distribution Using Asymmetric Encryption4.4 X.509 Certificates4.5 Public Key Infrastructure4.6 Federated Identity Management4.7 Recommended Reading4.8 Key Terms, Review Questions, and ProblemsChapter 5 Network Access Control and Cloud Security 5.1 Network Access Control5.2 Extensible Authentication Protocol5.3 IEEE 802.1X Port-Based Network Access Control5.4 Cloud Computing5.5 Cloud Security Risks and Countermeasures5.6 Data Protection in the Cloud5.7 Cloud Security as a Service5.8 Recommended Reading5.9 Key Terms, Review Questions, and ProblemsChapter 6 Transport-Level Security 6.1 Web Security Issues6.2 Secure Sockets Layer (SSL)6.3 Transport Layer Security (TLS)6.4 HTTPS6.5 Secure Shell (SSH)6.6 Recommended Reading6.7 Key Terms, Review Questions, and ProblemsChapter 7 Wireless Network Security 7.1 Wireless Security7.2 Mobile Device Security7.3 IEEE 802.11 Wireless LAN Overview7.4 IEEE 802.11i Wireless LAN Security7.5 Recommended Reading7.6 Key Terms, Review Questions, and ProblemsChapter 8 Electronic Mail Security 8.1 Pretty Good Privacy (PGP)8.2 S/MIME8.3 DomainKeys Identified Mail (DKIM)8.4 Recommended Web Sites8.5 Key Terms, Review Questions, and ProblemsChapter 9 IP Security 9.1 IP Security Overview9.2 IP Security Policy9.3 Encapsulating Security Payload9.4 Combining Security Associations9.5 Internet Key Exchange9.6 Cryptographic Suites9.7 Recommended Reading9.8 Key Terms, Review Questions, and ProblemsPART THREE SYSTEM SECURITYChapter 10 Malicious Software 10.1 Types of Malicious Software10.2 Propagation – Infected Content – Viruses10.3 Propagation – Vulnerability Exploit – Worms10.4 Propagation – Social Engineering – SPAM, Trojans10.5 Payload – System Corruption10.6 Payload – Attack Agent – Zombie, Bots10.7 Payload – Information Theft – Keyloggers, Phishing, Spyware10.8 Payload – Stealthing – Backdoors, Rootkits10.9 Countermeasures10.10 Distributed Denial of Service Attacks10.11 Recommended Reading10.12 Key Terms, Review Questions, and ProblemsChapter 11 Intruders 11.1 Intruders11.2 Intrusion Detection11.3 Password Management11.4 Recommended Reading11.5 Key Terms, Review Questions, and ProblemsChapter 12 Firewalls 12.1 The Need for Firewalls12.2 Firewall Characteristics12.3 Types of Firewalls12.4 Firewall Basing12.5 Firewall Location and Configurations12.6 Recommended Reading12.7 Key Terms, Review Questions, and ProblemsAPPENDICESAppendix A Some Aspects of Number Theory A.1 Prime and Relatively Prime NumbersA.2 Modular ArithmeticAppendix B Projects for Teaching Network Security B.1 Research ProjectsB.2 Hacking ProjectB.3 Programming ProjectsB.4 Laboratory ExercisesB.5 Practical Security AssessmentsB.6 Writing AssignmentsB.7 Reading/Report AssignmentsREFERENCESINDEXONLINE CHAPTERS AND APPENDICES – Online chapters, appendices, and other documents are Premium Content. Students must use the access card located in the front of the book to register and access the online premium content. If there is no access card, students can purchase access by going to www.pearsonhighered.com/stallings and selecting “purchase access to premium content.â€� Instructors must register on the site to access the material.Chapter 13 Network Management Security 13.1 Basic Concepts of SNMP13.2 SNMPv1 Community Facility13.3 SNMPv313.4 Recommended Reading13.5 Key Terms, Review Questions, and ProblemsChapter 14 Legal and Ethical Issues 14.1 Cybercrime and Computer Crime14.2 Intellectual Property14.3 Privacy14.4 Ethical Issues14.5 Recommended Reading14.6 Key Terms, Review Questions, and ProblemsChapter 15 SHA-3 15.1 Evaluation Criteria for SHA-315.2 The SHA-3 Algorithm15.3 Recommended Reading15.4 Key Terms and Review QuestionsAppendix C Standards and Standards-Setting Organizations C.1 The Importance of StandardsC.2 Internet Standards and the Internet SocietyC.3 National Institute of Standards and TechnologyAppendix D TCP/IP and OSI D.1 Protocols and Protocol ArchitecturesD.2 The TCP/IP Protocol ArchitectureD.3 The Role of an Internet ProtocolD.4 IPv4D.5 IPv6D.6 The OSI Protocol ArchitectureAppendix E Pseudorandom Number Generation E.1 PRNG RequirementsE.2 PRNG Using a Block CipherE.3 PRNG Using a Hash Function or Message Authentication CodeAppendix F Kerberos Encryption Techniques F.1 Password-to-Key TransformationF.2 Propagating Cipher Block Chaining ModeAppendix G Data Compression Using ZIP G.1 Compression AlgorithmG.2 Decompression AlgorithmAppendix H More on PGP H.1 True Random NumbersH.2 Pseudorandom NumbersH.3 Cryptographic Keys and Key RingsH.4 Public-Key ManagementAppendix I The International Reference AlphabetAppendix J The Base-Rate FallacyAppendix K Radix-64 ConversionGLOSSARYLIST OF ACRONYMSPeople also search: network security standards list network security essentials applications and standards network security guidelines Download sample free sample download If you need more samples or complete documents, please contact online customer service!
-
Solutions Manual for Computer Organization and Embedded Systems 6th Edition by Hamacher Complete downloadable Solutions Manual for Computer Organization and Embedded Systems 6th Edition by Hamacher. INSTRUCTOR RESOURCE INFORMATION TITLE: Computer Organization and Embedded Systems RESOURCE:Solutions Manual EDITION: 6th Edition AUTHOR: Hamacher, Vranesic, Zaky, Manjikian PUBLISHER: McGraw Hill Higher Education free sample download
-
Solution Manual for Starting out with Python, 5th Edition, Tony Gaddis This is completed downloadable of Solution Manual for Starting out with Python, 5th Edition, Tony Gaddis Product Details: This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. This access card provides access to MyLab Programming. Pearson eText is included. A clear and student-friendly introduction to the fundamentals of Python In Starting Out with Python®, 5th Edition, Tony Gaddis’ accessible coverage introduces students to the basics of programming in a high level language. Python, an easy-to-learn and increasingly popular object-oriented language, allows readers to become comfortable with the fundamentals of programming without the troublesome syntax that can be challenging for novices. With the knowledge acquired using Python, students gain confidence in their skills and learn to recognize the logic behind developing high-quality programs. Starting Out with Python discusses control structures, functions, and lists before classes. As with all Gaddis texts, clear and easy-to-read code listings, concise and practical real-world examples, focused explanations, and an abundance of exercises appear in every chapter. Updates to the 5th Edition include a new chapter on database programming, and new coverage of GUI programming, string processing and formatting, and turtle graphics topics. Personalize learning with MyLab Programming By combining trusted author content with digital tools and a flexible platform, MyLab personalizes the learning experience and improves results for each student. With MyLab Programming, students work through hundreds of short, auto-graded coding exercises and receive immediate and helpful feedback based on their work. Plus, get anytime, anywhere access with Pearson eText Pearson eText is a simple-to-use, mobile-optimized, personalized reading experience available within MyLab. It lets students highlight and take notes, all in one place – even when offline. Educators can easily customize the table of contents and share their own notes with students so they see the connection between their eText and what they learn in class. Table of Content: People Also Search: starting out with python 5th edition tony gaddis starting out with python 5th edition tony gaddis download scribd starting out with python 5th edition tony gaddis solution manual download pdf Download sample free sample download If you need more samples or complete documents, please contact online customer service!