買這商品的人也買了...
-
$1,340$1,273 -
$931Invitation to Cryptography
-
$780CMMI: Guidelines for Process Integration and Product Improvement (Harcover)
-
$1,100$1,078 -
$1,274Fundamentals of Computer Security (Hardcover)
-
$931Security in Computing, 3/e (平裝)
-
$931Internet Security: Cryptographic Principles, Algorithms and Protocols (Hardcover)
-
$680$666 -
$1,050$1,029 -
$350$277 -
$650$507 -
$1,150$1,127 -
$780$663 -
$650$507 -
$550$429 -
$980$774 -
$880$695 -
$680$537 -
$450$356 -
$720$569 -
$2,630$2,499 -
$2,750$2,613 -
$1,200$1,176 -
$820$804 -
$5,790$5,501
相關主題
商品描述
Description
Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided.
Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.
Table of contents
Contents
Preface vii
Introduction 1
1 Physical Security 15
1.1 Side-Channel Attacks 15
1.2 Physical Threats 20
1.3 Laptop Security 26
1.4 Disaster Recovery Planning 28
1.5 Privacy Protection 29
2 Viruses 33
2.1 Operating Systems 34
2.2 Computer Viruses 36
2.3 Virus Writers 40
2.4 Virus Propagation 43
2.5 Virus Classification 46
2.6 Boot Sector Viruses 48
2.7 File Infector Viruses 51
2.8 Companion Viruses 55
2.9 Multipartite Viruses 56
2.10 Macro and Script Viruses 57
2.11 Infected Images 59
2.12 Virus Life Cycle 62
2.13 Viruses and UNIX 65
2.14 Viruses and the Macintosh 65
2.15 Viruses and the Amiga 66
2.16 Virus Replication 66
2.17 Virus Payload 66
2.18 Virus Organization 74
2.19 Virus Naming 75
xx Contents
2.20 Virus Hiding Methods 76
2.21 Polymorphism 80
2.22 Virus Stealth Techniques 83
2.23 Interrupts and Viruses 84
2.24 Trapdoors 88
3 Worms 91
3.1 Code Red I 93
3.2 Worming Techniques 95
3.3 Proposing a CCDC 105
3.4 The Internet Worm 108
4 Trojan Horses 113
4.1 Applications of Trojans 114
4.2 Installing a Trojan 116
4.3 Rigging a Compiler 118
5 ExamplesofMalware 125
5.1 The Lehigh Virus 125
5.2 The Brain Virus 126
5.3 The Michaelangelo Virus 127
5.4 The SirCAM Virus 128
5.5 The Melissa Virus 129
5.6 Scores Virus 130
5.7 Swiss Amiga Virus 131
5.8 Christmas Card Virus 131
5.9 VBS.KAK Worm 132
5.10 The Cruncher Virus 133
5.11 Opener Virus 134
5.12 MTX Worm/Virus 135
6 Prevention and Defenses 139
6.1 Understanding Vulnerabilities 139
6.2 Defenses Against Malware 144
6.3 Anti-Virus Software 145
6.4 Backups and Such 155
6.5 Hoaxes 160
7 Network Security 163
7.1 Internet Vulnerabilities 163
7.2 Port Scanning 164
7.3 Spoofs 165
7.4 Spam 169
7.5 Denial of Service 181
7.6 Firewall Basics 184
8 Authentication 189
8.1 Local Authentication 190
8.2 Biometric Techniques 190
8.3 Passwords 196
Contents xxi
9 Spyware 211
9.1 Introduction and Definition 212
9.2 RIAA and Spyware 215
9.3 Terrorism and Spyware 217
9.4 Political Contributions 218
9.5 Distribution of Spyware 219
9.6 Remote Reporting 222
9.7 Adware 225
9.8 Spyware? 226
10 Identity Theft 231
10.1 Introduction 232
10.2 Shredding 236
10.3 Internet Cookies 238
10.4 Phishing 239
10.5 The Homograph Threat 245
11 Privacy and Trust 247
11.1 Privacy Issues 248
11.2 Online Privacy 251
11.3 Children’s Privacy 253
11.4 Trust 258
12 Elements Of Cryptography 263
12.1 Principles of Cryptography 264
12.2 Kerckhoffs’s Principle 265
12.3 Polybius’s Monoalphabetic Cipher 266
12.4 Polybius’s Polyalphabetic Cipher 268
12.5 The One-Time Pad 269
12.6 The Key Distribution Problem 271
12.7 Diffie–Hellman–Merkle Keys 272
12.8 Public-Key Cryptography 273
12.9 RSA Cryptography 274
12.10 SSL: Secure Socket Layer 278
A l33t Speak 285
B Virus Timeline 289
Concluding Remarks 305
Answers to Exercises 311
Glossary 327
Bibliography 343
Index 357
商品描述(中文翻譯)
描述
任何有電腦的人都聽說過病毒,不得不處理過幾個病毒,並且一直在與垃圾郵件、間諜軟件和磁盤崩潰作鬥爭。這本書旨在為那些熟悉計算機和計算基本概念並希望將其知識擴展到計算機和網絡安全領域的人提供一個起點。它全面涵蓋了計算機安全的所有主要領域,旨在為讀者在計算機安全領域提供完整的基礎。書中提供了練習題,旨在加強讀者的知識,並提供答案。
這本書以清晰易懂的風格撰寫,針對高年級本科生和非專業人士,他們想了解每天面臨的安全問題。本書的技術水平較低,不需要數學知識,只需要基本的計算機和計算概念。《計算機安全基礎》將成為學生和專業人士的寶貴工具。
目錄
前言
引言
1. 物理安全
1.1 側信道攻擊
1.2 物理威脅
1.3 笔记本电脑安全
1.4 灾难恢复计划
1.5 隐私保护
2. 病毒
2.1 操作系统
2.2 计算机病毒
2.3 病毒作者
2.4 病毒传播
2.5 病毒分类
2.6 引导扇区病毒
2.7 文件感染病毒
2.8 伴生病毒
2.9 多部分病毒
2.10 宏和脚本病毒
2.11 感染的图像
2.12 病毒生命周期
2.13 病毒和UNIX
2.14 病毒和Macintosh
2.15 病毒和Amiga
2.16 病毒复制
2.17 病毒载荷
2.18 病毒组织
2.19 病毒命名
2.20 病毒隐藏方法
2.21 多态性
2.22 病毒隐蔽技术
2.23 中断和病毒
2.24 陷阱门
3. 蠕虫
3.1 红色代码I
3.2 蠕虫技术
3.3 提议CCDC
3.4 互联网蠕虫
4. 木马
4.1 木马的应用
4.2 安装木马
4.3 操纵编译器
5. 恶意软件示例
5.1 Lehigh病毒
5.2 Brain病毒
5.3 Michaelangelo病毒
5.4 SirCAM病毒
5.5 Melissa病毒
5.6 Scores病毒
5.7 Swiss Amiga病毒
5.8 圣诞卡病毒
5.9 VBS.KAK蠕虫
5.10 Cruncher病毒
5.11 Opener病毒
5.12 MTX蠕虫/病毒
6. 预防和防御
6.1 理解漏洞
6.2 防御恶意软件
6.3 反病毒软件
6.4 备份等
6.5 恶作剧
7. 网络安全
7.1 互联网漏洞
7.2 端口扫描
7.3 伪装
7.4 垃圾邮件
7.5 拒绝服务
7.6 防火墙基础知识
8. 身份验证
8.1 本地身份验证
8.2 生物识别技术
8.3 密码
9. 间谍软件
9.1 介绍和定义
9.2 RIAA和间谍软件
9.3 恐怖主义和间谍软件
9.4 政治捐款
9.5 间谍软件的分发
9.6 远程报告
9.7 广告软件
9.8 间谍软件?
10. 身份盗窃