52ky 发表于 2022-9-15 15:42:06

网络安全编程技术与实例

网络安全扫描编程,网络协议分析编程。网络数据包生成编程。侵/入检测编程。本书供网络安全研究和开发人员以及网络安全爱好者阅览,也可以作为计算机网络和网络安全专业方面的教育参考书。第1章网络安全概述1.1网络安全原理1.1.1信息安全1.1.2网络安全1.1.3网络安全模型1.1.4安全策略1.1.5安全管理1.2网络安全的构成1.2.1客户端安全1.2.2服务器安全1.2.3网络设安全1.3研究网络安全的必要性1.3.1技术层面1.3.2社会层面1.4网络安全技术1.4.1网络安全扫描1.4.2网络协议分析1.4.3网络数据包生成1.4.4网络侵/入检测第2章网络安全编程基础2.1协议基础2.1.1TCP/IP协议2.1.2OSI协议模型2.2网络编程2.2.1套接字编程2.2.2WinSock编程2.3初始套接字2.3.1初始套接字基本原理2.3.2发送数据2.3.3监听数据2.4操作系统2.4.1Linux操作系统2.4.2windows操作系统2.5编程言语2.5.1C言语2.5.2C++言语2.5.3Shell言语2.5.4别的编程言语2.6Visualc++网络安全编程基础2.6.1进程管理2....

(Network security scanning programming, network protocol analysis programming. Network packet generation programming. Intrusion/Intrusion Detection Programming. This book is read for network security research and development personnel and network security enthusiasts, and can also be used as an educational reference book for computer networks and network security. Chapter 1 Network Security Overview 1.1 Network Security Principles 1.1.1 Information Security 1.1.2 Network Security 1.1.3 Network Security Model 1.1.4 Security Policy 1.1.5 Security Management 1.2 Network Security Composition 1.2.1 Client Security 1.2.2 Server Security 1.2.3 Network Design Security 1.3 Necessity of Researching Network Security 1.3.1 Technical Level 1.3.2 Social Level 1.4 Network Security Technology 1.4.1 Network Security Scanning 1.4.2 Network Protocol Analysis 1.4.3 Network Packet Generation 1.4. 4 Network Intrusion/Intrusion Detection Chapter 2 Network Security Programming Fundamentals 2.1 Protocol Fundamentals 2.1.1 TCP/IP Protocol 2.1.2 OSI Protocol Model 2.2 Network Programming 2.2.1 Socket Programming 2.2.2 WinSock Programming 2.3 Initial Socket 2.3.1 Initial Socket fundamentals 2.3.2 Sending data 2.3.3 Monitoring data 2.4 Operating system 2.4.1 Linux operating system 2.4.2 Windows operating system 2.5 Programming language 2.5.1 C language 2.5.2 C   language 2.5.3 Shell language 2.5.4 Other programming languages 2.6 Visualc   Network Security Programming Fundamentals 2.6.1 Process Management 2.....)




页: [1]
查看完整版本: 网络安全编程技术与实例