找回密码
 立即注册
企业管理 2022-09-11 52 0star收藏 版权: . 保留作者信息 . 禁止商业使用 . 禁止修改作品
第1章网络互连协议和规范概述11.1网际协议31.1.1IP寻址31.1.2IP安全危险41.2用户数据报协议71.2.1攻击用户数据报协议服务:SATAN轻松应对71.2.2用于UNIX和WindowsNT上的因特网安全系统71.3传输控制协议91.4通过CIDR扩展IP地址111.4.1TCP/IP安全危险及其对策111.4.2IPSEC—IETF提出的IP安全对策151.4.3IPSO—(美)国防部IP安全对策151.5路由信息协议151.6MBONE—组播骨干网161.7因特网控制报文协议181.8因特网组管理协议181.9开放式最短途径优先191.10边界网关协议版本4(BGP-4)201.11地址转换协议201.11.1反向地址转换协议201.11.2通过路由器传递IP数据报的安全危险201.12简单网络管理协议211.13监视ISP连接211.14下一代IP协议IPv6211.14.1地址扩展221.14.2网络设备的自动配置221.14.3安全性221.14.4实时功能221.14.5组播231.14.6IPv6安全性231.15网络时间协议231.16动态主机配置协议231.17Windows套接字(Winsock)规范241.18域名系统241.19防火墙概念241.19.1防火墙故障271.19.2停火区271.19.3认证问题281.19.4周边信赖281.19.5内部网28第2章基础连接302.1用于TTY312.2UNIXtoUNIXCopy332.3SLIP和PPP342.4Rlogin342.5虚拟终端协议352.5.1哥伦比亚大学的Kermit:一种安全可靠的Telnet服务器352.5.2Telnet服务的安全考虑402.5.3网络安全系统管理员402.5.4Telnet会话安全检测表422.6简单文件传输协议432.7文件传输协议442.8使用防火墙的一些挑战452.9IP网络日益添加的安全需要47第3章加密:满足吗483.1导言503.2对称密钥加密(私有密钥)503.2.1数据加密规范503.2.2世界数据加密算法523.2.3CAST算法533.2.4Skipjack算法583.2.5RC2/RC4算法593.3非对称密钥加密/公开密钥加密593.3.1RSA603.3.2数字签名规范613.4消息摘要算法623.4.1MD2、MD4和MD5623.4.2安全哈希规范/安全哈希算法643.5证书643.6密钥管理713.6.1Kerberos协议713.6.2密钥交换算法783.7密码分析与攻击793.7.1唯密文攻击793.7.2已知明文攻击793.7.3选择明文攻击803.7.4自适应选择明文攻击803.7.5中间人攻击80等等

(Chapter 1 Overview of Internetworking Protocols and Specifications 11.1 Internet Protocol 31.1.1 IP Addressing 31.1.2 IP Security Dangers 41.2 User Datagram Protocol 71.2.1 Attacks on User Datagram Protocol Services: SATAN Ease 71.2.2 For UNIX and Windows NT The Internet Security System 71.3 Transmission Control Protocol 91.4 Extending IP Addresses via CIDR 111.4.1 TCP/IP Security Dangers and Their Countermeasures 111.4.2 IPSEC—IP Security Countermeasures Proposed by IETF 151.4.3 IPSO—(US) Department of Defense IP Security Countermeasures 151.5 Routing Information Protocol 151.6MBONE—Multicast Backbone 161.7 Internet Control Message Protocol 181.8 Internet Group Management Protocol 181.9 Open Shortest Path First 191.10 Border Gateway Protocol Version 4 (BGP-4) 201.11 Address Translation Protocol 201.11.1 Reverse Address Translation Protocol 201.11.2 Security Dangers of Passing IP Datagrams Through Routers 201.12 Simple Network Management Protocol 211.13 Monitoring ISP Connections 211.14 Next-Generation IP Protocol IPv6 211.14.1 Address Extensions 221.14.2 Automatic Configuration of Network Devices 221.14.3 Security 221.14.4 Real-Time Capabilities 221.14.5 Groups 231.14.6 IPv6 Security 231.15 Network Time Protocol 231.16 Dynamic Host Configuration Protocol 231.17 Windows Sockets (Winsock) Specification 241.18 Domain Name System 241.19 Firewall Concepts 241.19.1 Firewall Failures 271.19.2 Ceasefire Zones 271.19.3 Authentication Issues 281.19.4 Peripheral Trust 281.19.5 Intranets 28 Chapter 2 Basic Connections 302.1 For TTY312.2UNIXtoUNIXCopy332.3SLIP and PPP342.4Rlogin342.5 Virtual Terminal Protocols 352.5.1 Columbia University's Kermit: A Secure and Reliable Telnet Server 352.5.2Security Considerations for Telnet Services 402.5.3 Network Security System Administrator 402.5.4 Telnet Session Security Checklist 422.6 Simple File Transfer Protocol 432.7 File Transfer Protocol 442.8 Some Challenges of Using Firewalls 452.9 The Increasing Security Needs of IP Networks 47 Chapter 3 Encryption: Satisfied 483.1 Introduction 503.2 Symmetry Key Encryption (Private Key) 503.2.1 Data Encryption Specification 503.2.2 World Data Encryption Algorithm 523.2.3CAST Algorithm 533.2.4Skipjack Algorithm 583.2.5RC2/RC4 Algorithm 593.3 Asymmetric Key Encryption/Public Key Encryption 593.3.1RSA603. 3.2 Digital Signature Specification 613.4 Message Digest Algorithm 623.4.1M D2, MD4, and MD5 623.4.2 Secure Hash Specifications/Secure Hash Algorithms 643.5 Certificates 643.6 Key Management 713.6.1 Kerberos Protocol 713.6.2 Key Exchange Algorithms 783.7 Cryptanalysis and Attacks 793.7.1 Ciphertext-Only Attacks 793.7.2 Known Plaintext attack 793.7.3 Selected plaintext attack 803.7.4 Adaptive selected plaintext attack 803.7.5 Man-in-the-middle attack 80 and so on)

[下载]10464439239.rar




上一篇:火灾报警系统的资料
下一篇:Cisco ASA PIX FWSM防火墙手册