Foundations of Computer Security
暫譯: 計算機安全基礎

David Salomon

  • 出版商: Springer
  • 出版日期: 2005-12-23
  • 售價: $1,400
  • 貴賓價: 9.8$1,372
  • 語言: 英文
  • 頁數: 369
  • 裝訂: Hardcover
  • ISBN: 1846281938
  • ISBN-13: 9781846281938
  • 相關分類: 資訊安全
  • 立即出貨 (庫存=1)

買這商品的人也買了...

商品描述

Description

Anyone with a computer has heard of viruses, had to deal with several, and has been struggling with spam, spyware, and disk crashes. This book is intended as a starting point for those familiar with basic concepts of computers and computations and who would like to extend their knowledge into the realm of computer and network security. Its comprehensive treatment of all the major areas of computer security aims to give readers a complete foundation in the field of Computer Security. Exercises are given throughout the book and are intended to strengthening the reader’s knowledge - answers are also provided.

Written in a clear, easy to understand style, aimed towards advanced undergraduates and non-experts who want to know about the security problems confronting them everyday. The technical level of the book is low and requires no mathematics, and only a basic concept of computers and computations. Foundations of Computer Security will be an invaluable tool for students and professionals alike.

Table of contents

Contents
Preface vii
Introduction 1
1 Physical Security 15
1.1 Side-Channel Attacks 15
1.2 Physical Threats 20
1.3 Laptop Security 26
1.4 Disaster Recovery Planning 28
1.5 Privacy Protection 29
2 Viruses 33
2.1 Operating Systems 34
2.2 Computer Viruses 36
2.3 Virus Writers 40
2.4 Virus Propagation 43
2.5 Virus Classification 46
2.6 Boot Sector Viruses 48
2.7 File Infector Viruses 51
2.8 Companion Viruses 55
2.9 Multipartite Viruses 56
2.10 Macro and Script Viruses 57
2.11 Infected Images 59
2.12 Virus Life Cycle 62
2.13 Viruses and UNIX 65
2.14 Viruses and the Macintosh 65
2.15 Viruses and the Amiga 66
2.16 Virus Replication 66
2.17 Virus Payload 66
2.18 Virus Organization 74
2.19 Virus Naming 75
xx Contents
2.20 Virus Hiding Methods 76
2.21 Polymorphism 80
2.22 Virus Stealth Techniques 83
2.23 Interrupts and Viruses 84
2.24 Trapdoors 88
3 Worms 91
3.1 Code Red I 93
3.2 Worming Techniques 95
3.3 Proposing a CCDC 105
3.4 The Internet Worm 108
4 Trojan Horses 113
4.1 Applications of Trojans 114
4.2 Installing a Trojan 116
4.3 Rigging a Compiler 118
5 ExamplesofMalware 125
5.1 The Lehigh Virus 125
5.2 The Brain Virus 126
5.3 The Michaelangelo Virus 127
5.4 The SirCAM Virus 128
5.5 The Melissa Virus 129
5.6 Scores Virus 130
5.7 Swiss Amiga Virus 131
5.8 Christmas Card Virus 131
5.9 VBS.KAK Worm 132
5.10 The Cruncher Virus 133
5.11 Opener Virus 134
5.12 MTX Worm/Virus 135
6 Prevention and Defenses 139
6.1 Understanding Vulnerabilities 139
6.2 Defenses Against Malware 144
6.3 Anti-Virus Software 145
6.4 Backups and Such 155
6.5 Hoaxes 160
7 Network Security 163
7.1 Internet Vulnerabilities 163
7.2 Port Scanning 164
7.3 Spoofs 165
7.4 Spam 169
7.5 Denial of Service 181
7.6 Firewall Basics 184
8 Authentication 189
8.1 Local Authentication 190
8.2 Biometric Techniques 190
8.3 Passwords 196
Contents xxi
9 Spyware 211
9.1 Introduction and Definition 212
9.2 RIAA and Spyware 215
9.3 Terrorism and Spyware 217
9.4 Political Contributions 218
9.5 Distribution of Spyware 219
9.6 Remote Reporting 222
9.7 Adware 225
9.8 Spyware? 226
10 Identity Theft 231
10.1 Introduction 232
10.2 Shredding 236
10.3 Internet Cookies 238
10.4 Phishing 239
10.5 The Homograph Threat 245
11 Privacy and Trust 247
11.1 Privacy Issues 248
11.2 Online Privacy 251
11.3 Children’s Privacy 253
11.4 Trust 258
12 Elements Of Cryptography 263
12.1 Principles of Cryptography 264
12.2 Kerckhoffs’s Principle 265
12.3 Polybius’s Monoalphabetic Cipher 266
12.4 Polybius’s Polyalphabetic Cipher 268
12.5 The One-Time Pad 269
12.6 The Key Distribution Problem 271
12.7 Diffie–Hellman–Merkle Keys 272
12.8 Public-Key Cryptography 273
12.9 RSA Cryptography 274
12.10 SSL: Secure Socket Layer 278
A l33t Speak 285
B Virus Timeline 289
Concluding Remarks 305
Answers to Exercises 311
Glossary 327
Bibliography 343
Index 357
 

商品描述(中文翻譯)

**描述**

任何擁有電腦的人都聽說過病毒,必須處理過幾個,並且一直在與垃圾郵件、間諜軟體和磁碟崩潰作鬥爭。本書旨在為那些熟悉基本電腦和計算概念的人提供一個起點,並希望將他們的知識擴展到計算機和網絡安全的領域。它對計算機安全所有主要領域的全面處理旨在為讀者提供計算機安全領域的完整基礎。全書中提供了練習題,旨在加強讀者的知識,並提供了答案。

本書以清晰、易於理解的風格撰寫,針對希望了解日常面臨的安全問題的高年級本科生和非專家。書中的技術水平較低,不需要數學知識,只需對電腦和計算有基本概念。《計算機安全基礎》將成為學生和專業人士的寶貴工具。

**目錄**

內容
前言 vii
導言 1
1 物理安全 15
1.1 側信道攻擊 15
1.2 物理威脅 20
1.3 筆記型電腦安全 26
1.4 災難恢復計劃 28
1.5 隱私保護 29
2 病毒 33
2.1 作業系統 34
2.2 電腦病毒 36
2.3 病毒作者 40
2.4 病毒傳播 43
2.5 病毒分類 46
2.6 開機區病毒 48
2.7 檔案感染病毒 51
2.8 伴隨病毒 55
2.9 多部件病毒 56
2.10 巨集和腳本病毒 57
2.11 感染的圖像 59
2.12 病毒生命週期 62
2.13 病毒與 UNIX 65
2.14 病毒與 Macintosh 65
2.15 病毒與 Amiga 66
2.16 病毒複製 66
2.17 病毒有效載荷 66
2.18 病毒組織 74
2.19 病毒命名 75
2.20 病毒隱藏方法 76
2.21 多形性 80
2.22 病毒隱形技術 83
2.23 中斷與病毒 84
2.24 陷門 88
3 蠕蟲 91
3.1 Code Red I 93
3.2 蠕蟲技術 95
3.3 提議 CCDC 105
3.4 網際網路蠕蟲 108
4 特洛伊木馬 113
4.1 特洛伊木馬的應用 114
4.2 安裝特洛伊木馬 116
4.3 操控編譯器 118
5 惡意軟體範例 125
5.1 Lehigh 病毒 125
5.2 Brain 病毒 126
5.3 Michaelangelo 病毒 127
5.4 SirCAM 病毒 128
5.5 Melissa 病毒 129
5.6 Scores 病毒 130
5.7 Swiss Amiga 病毒 131
5.8 聖誕卡病毒 131
5.9 VBS.KAK 蠕蟲 132
5.10 Cruncher 病毒 133
5.11 Opener 病毒 134
5.12 MTX 蠕蟲/病毒 135
6 預防與防禦 139
6.1 理解漏洞 139
6.2 對抗惡意軟體的防禦 144
6.3 防病毒軟體 145
6.4 備份等 155
6.5 騙局 160
7 網絡安全 163
7.1 網際網路漏洞 163
7.2 端口掃描 164
7.3 偽造 165
7.4 垃圾郵件 169
7.5 拒絕服務 181
7.6 防火牆基礎 184
8 認證 189
8.1 本地認證 190
8.2 生物識別技術 190
8.3 密碼 196
9 間諜軟體 211
9.1 介紹與定義 212
9.2 RIAA 與間諜軟體 215
9.3 恐怖主義與間諜軟體 217
9.4 政治捐款 218
9.5 間諜軟體的分發 219
9.6 遠程報告 222
9.7 廣告軟體 225
9.8 間諜軟體? 226
10 身份盜竊 231
10.1 介紹 232
10.2 切碎 236
10.3 網際網路 Cookie 238
10.4 網路釣魚 239
10.5 同形威脅 245
11 隱私與信任 247
11.1 隱私問題 248
11.2 在線隱私 251
11.3 兒童隱私 253
11.4 信任 258
12 密碼學要素 263
12.1 密碼學原則 264
12.2 克克霍夫原則 265
12.3 波利比烏斯單字母密碼 266
12.4 波利比烏斯多字母密碼 268
12.5 一次性密碼 269
12.6 密鑰分發問題 271
12.7 迪菲-赫爾曼-梅克爾密鑰 272
12.8 公開密鑰密碼學 273
12.9 RSA 密碼學 274
12.10 SSL:安全套接字層 278
A l33t 語言 285
B 病毒時間線 289
結語 305
練習題答案 311
詞彙表 327
參考文獻 343
索引 357