|
关于我们
精品教材 更多 规划教材 更多 |
网络安全与管理(第2版) ![]()
本书内容涵盖网络安全理论、密码学基础及认证、网络安全应用与管理。全书内容共 8 章,第 1 章为绪论;第 2 章至第 5 章主要讨论密码学基础、认证与密钥管理、网络安全防护技术和网络安全应用,着力将网络安全理论与应用完美结合起来;第 6、7、8 章从安全管理的角度讨论恶意代码防范、网络渗透测试和网络安全管理,意在保障网络的安全运行。为帮助读者更好地理解基础理论并应对认证考试,各章均附有小结、练习及小测验题,并对典型题例给出了解答提示。
刘化君:南京工程学院通信学院教授、原院长,电子工业出版社优秀作者。长期从事计算机网络与通信的教学与科研工作。主持完成江苏省高校自然科学基金等项目3项,以及多项省市重点计算机网络项目;发表学术论文60余篇,出版专著和教材30多本,其中入选"十一五”国家级规划教材1本;获国家级教学成果二等奖1项,山东省教育厅科技进步奖著作二等奖1项。
目 录
第 1 章 绪论································································································.1 1.1 网络安全的概念 ················································································.1 1.1.1 网络安全的定义·······································································.1 1.1.2 网络安全的属性·······································································.8 1.1.3 网络安全是一个系统·································································10 练习 ······························································································.11 1.2 网络安全体系···················································································.11 1.2.1 网络安全体系结构···································································.11 1.2.2 网络安全模型 ··········································································13 1.2.3 网络安全策略及其技术······························································15 1.2.4 网络协议安全性分析·································································18 练习 ·······························································································24 1.3 网络安全威胁····················································································25 1.3.1 网络安全的脆弱性····································································25 1.3.2 网络犯罪 ················································································29 1.3.3 网络安全现状 ··········································································32 练习 ·······························································································34 1.4 网络安全法律法规与标准·····································································35 1.4.1 我国网络安全法律体系······························································35 1.4.2 网络安全等级保护····································································37 1.4.3 网络安全标准与测评·································································40 练习 ·······························································································43 本章小结 ································································································44 小测验 ····························································································44 第 2 章 密码学基础·······················································································46 2.1 密码学的基本概念··············································································46 2.1.1 密码学发展简况·······································································46 2.1.2 密码系统 ················································································50 2.1.3 现代密码体制 ··········································································53 练习 ·······························································································55 2.2 对称密码体制····················································································56 2.2.1 古典密码 ················································································57 2.2.2 数据加密标准(DES) ······························································60 2.2.3 高级加密标准(AES) ······························································64 2.2.4 中国商用分组密码算法(SM4) ··················································68 2.2.5 序列密码 ················································································70 练习 ·······························································································71 2.3 公钥密码体制····················································································72 2.3.1 RSA 算法 ···············································································73 2.3.2 ElGamal 密码算法·····································································75 2.3.3 椭圆曲线密码与 SM2 ································································76 练习 ·······························································································80 2.4 密码分析与选用·················································································80 2.4.1 密码分析方法 ··········································································81 2.4.2 密码算法的比较·······································································82 2.4.3 密码算法的选用·······································································83 练习 ·······························································································84 本章小结 ································································································85 小测验 ····························································································85 第 3 章 认证及密钥管理·················································································87 3.1 消息认证··························································································87 3.1.1 哈希函数 ················································································87 3.1.2 消息摘要算法(MD) ·······························································89 3.1.3 安全哈希算法(SHA)与 SM3 ····················································92 3.1.4 消息认证码(MAC) ································································94 练习 ·······························································································96 3.2 数字签名··························································································96 3.2.1 何谓数字签名 ··········································································97 3.2.2 RSA 签名体制 ······································································.100 3.2.3 Elgamal 签名体制 ··································································.101 3.2.4 椭圆曲线密码数字签名体制·····················································.102 3.2.5 SM2 签名方案 ······································································.103 练习 ····························································································.104 3.3 身份认证·······················································································.105 3.3.1 Kerberos 认证系统 ·································································.105 3.3.2 X.509 认证服务·····································································.107 3.3.3 数字证书 ·············································································.108 3.3.4 常用实体认证方法·································································.111 练习 ····························································································.113 3.4 密钥管理·······················································································.114 3.4.1 密钥种类及分级保护······························································.114 3.4.2 密钥的协商与分配·································································.116 3.4.3 Diffie-Hellman 密钥交换··························································.118 3.4.4 密钥管理机制 ·······································································.120 练习 ····························································································.123 本章小结 ·····························································································.124 小测验 ·························································································.124 第 4 章 网络安全防护技术···········································································.126 4.1 访问控制·······················································································.126 4.1.1 访问控制的基本概念······························································.126 4.1.2 AAA 访问控制······································································.128 4.1.3 访问控制列表 ·······································································.129 4.1.4 标准 IP 访问控制列表的配置····················································.130 4.1.5 扩展 IP 访问控制列表的配置····················································.131 练习 ····························································································.135 4.2 防火墙··························································································.135 4.2.1 防火墙概述 ··········································································.135 4.2.2 防火墙的类型及其工作原理·····················································.137 4.2.3 防火墙防御体系结构······························································.139 4.2.4 防火墙的应用配置·································································.143 练习 ····························································································.151 4.3 入侵检测与入侵防御········································································.151 4.3.1 入侵检测技术 ·······································································.152 4.3.2 入侵检测系统(IDS) ····························································.153 4.3.3 典型 IDS 的构建与应用···························································.156 4.3.4 入侵防御系统 ·······································································.163 4.3.5 入侵容忍 ·············································································.164 练习 ····························································································.165 4.4 主动防御技术·················································································.166 4.4.1 沙箱 ···················································································.166 4.4.2 拟态防御 ·············································································.168 4.4.3 移动目标防御 ·······································································.172 4.4.4 类免疫防御 ··········································································.173 练习 ····························································································.174 本章小结 ·····························································································.174 小测验 ·························································································.175 第 5 章 网络安全应用·················································································.177 5.1 网络地址转换及其应用·····································································.177 5.1.1 NAT ···················································································.177 5.1.2 静态 NAT 的配置···································································.179 5.1.3 动态 NAT 的配置···································································.180 5.1.4 网络地址端口转换配置···························································.182 练习 ····························································································.184 5.2 IP 安全 ·························································································.184 5.2.1 IPSec 安全体系结构 ·······························································.185 5.2.2 IPSec 协议 ···········································································.187 5.2.3 IPSec 的工作原理及应用 ·························································.188 练习 ····························································································.192 5.3 虚拟专用网····················································································.193 5.3.1 VPN 的工作原理 ···································································.193 5.3.2 VPN 的应用类型 ···································································.195 5.3.3 VPN 的实现 ·········································································.197 5.3.4 IPSec VPN 应用实例·······························································.198 练习 ····························································································.201 5.4 可信计算·······················································································.202 5.4.1 可信计算的概念····································································.202 5.4.2 可信计算体系结构·································································.204 5.4.3 构建可信计算环境·································································.205 练习 ····························································································.208 5.5 区块链··························································································.208 5.5.1 区块链的概念 ·······································································.209 5.5.2 区块链的形成 ·······································································.212 5.5.3 区块链的部署应用·································································.214 练习 ····························································································.214 5.6 网络物理隔离·················································································.215 5.6.1 物理隔离与逻辑隔离······························································.215 5.6.2 物理隔离技术实现·································································.216 5.6.3 物理隔离产品及技术指标························································.220 练习 ····························································································.221 本章小结 ·····························································································.222 小测验 ·························································································.223 第 6 章 恶意代码防范·················································································.224 6.1 恶意代码概述·················································································.224 6.1.1 何谓恶意代码 ·······································································.224 6.1.2 典型的恶意代码····································································.229 练习 ····························································································.234 6.2 恶意代码的机理··············································································.235 6.2.1 恶意代码实现机理·································································.235 6.2.2 恶意代码攻击方式·································································.239 练习 ····························································································.244 6.3 恶意代码检测与分析········································································.245 6.3.1 恶意代码检测方法·································································.245 6.3.2 恶意代码分析技术·································································.248 6.3.3 典型恶意代码分析·································································.250 练习 ····························································································.260 6.4 恶意代码对抗·················································································.260 6.4.1 恶意代码防范方法·································································.260 6.4.2 恶意代码防御技术·································································.262 练习 ····························································································.267 本章小结 ·····························································································.268 小测验 ·························································································.268 第 7 章 网络渗透测试·················································································.270 7.1 渗透测试方法论··············································································.270 7.1.1 渗透测试的定义····································································.270 7.1.2 组建一个渗透测试实验室························································.273 7.1.3 渗透测试的基本流程······························································.276 7.1.4 网络渗透测试示例·································································.278 练习 ····························································································.282 7.2 网络扫描·······················································································.282 7.2.1 端口扫描 ·············································································.282 7.2.2 目标系统类型探测·································································.284 7.2.3 漏洞挖掘与利用····································································.285 练习 ····························································································.293 7.3 密码破译·······················································································.294 7.3.1 密码及其安全性····································································.294 7.3.2 枚举法破解 ··········································································.295 7.3.3 在线破译 ·············································································.297 7.3.4 离线破译 ·············································································.298 7.3.5 非技术方法破译····································································.300 练习 ····························································································.301 7.4 无线网络的渗透测试········································································.301 7.4.1 无线网络的安全性·································································.301 7.4.2 无线网络加密破解·································································.305 7.4.3 无线网络渗透测试演练···························································.309 7.4.4 无线网络的安全防护······························································.312 练习 ····························································································.313 本章小结 ·····························································································.314 小测验 ·························································································.314 第 8 章 网络安全管理·················································································.316 8.1 网络安全工程·················································································.316 8.1.1 网络安全工程过程·································································.316 8.1.2 网络安全工程解决方案···························································.319 练习 ····························································································.325 8.2 网络测试与分析··············································································.326 8.2.1 查看和设置网络配置······························································.326 8.2.2 网络连通状态测试·································································.327 8.2.3 查看和设置地址解析协议表项··················································.328 8.2.4 路由跟踪查询 ·······································································.329 8.2.5 查看网络状态 ·······································································.331 8.2.6 查看域名 ·············································································.333 练习 ····························································································.334 8.3 网络安全风险评估与审计··································································.334 8.3.1 网络安全风险评估原理···························································.335 8.3.2 网络安全威胁态势评估···························································.339 8.3.3 网络入侵电子取证·································································.343 8.3.4 网络安全审计 ·······································································.344 练习 ····························································································.346 8.4 网络系统监测与应急响应··································································.346 8.4.1 网络系统监测 ·······································································.347 8.4.2 网络安全应急响应·································································.348 练习 ····························································································.350 8.5 网络系统维护与更新········································································.351 8.5.1 TCP/IP 网络故障诊断 ·····························································.351 8.5.2 网络合规使用 ·······································································.359 8.5.3 网络安全运维 ·······································································.359 典型例题解析 ················································································.360 练习 ····························································································.361 本章小结 ·····························································································.362 小测验 ·························································································.363 参考文献 ···································································································.366
我要评论
|


精品教材 
