读书月福利
欢迎光临中图网 请 | 注册
> >
防火墙技术指南:英文版

防火墙技术指南:英文版

出版社:世界图书出版公司出版时间:2001-04-01
开本: 21cm 页数: 21,678页
中 图 价:¥76.7(7.3折) 定价  ¥105.0 登录后可看到会员价
暂时缺货 收藏
运费6元,满69元免运费
?快递不能达地区使用邮政小包,运费14元起
云南、广西、海南、新疆、青海、西藏六省,部分地区快递不可达
本类五星书更多>
微信公众号

防火墙技术指南:英文版 版权信息

  • ISBN:7506249715
  • 条形码:9787506249713 ; 978-7-5062-4971-3
  • 装帧:一般胶版纸
  • 册数:暂无
  • 重量:暂无
  • 所属分类:>

防火墙技术指南:英文版 目录

PrefaceAcknowledgmentsPart 1 Introducing TCP/IP and the Need for Security:FirewallsChapter lInternetworking Protocols and Standards:An OverviewInternet Protocol (IP)How IP Addressing WorksIP Security RisksUser Datagram Protocol (UDP)Attacking UDP Services: SATAN at EaseISS for UNIX and Windows NTTransmission Control Protocol (TCP)IP AddressesExtending IP Addresses Through CIDRTCP/IP Security Risks and CountermeasuresIPSEC-An IETF IP Security CountermeasureIPSO-A DOD IP Security CountermeasureRouting Information Protocol (RIP)MBONE - The Multicast BackboneInternet Control Message Protoco( (ICMP)Internet Group Management Protocol (IGMP)Open Shortest-Path First (OSPF)Border Gateway Protocol Version 4 (BGP4)Address Resolution ProtocolReverse Address Resolution Protocol (RARP)Security Risks of Passing IP Datagrams ThroughRoutersSimple Network Management Protocol (SNMP)Watch Your ISP ConnectionThe Internet Protocol Next Generation or IPv6Address ExpansionAutomatic Configuration of Network DevicesSecurityReal-Time Perf ormanceMulticastingIPv6 SecurityNetwork Time Protocol (NTP)Dynamic Host Conguration Protocol (DHCP)Windows SocketsDomain Name System (DNS)Limiting DNS InformationFirewalls ConceptsThe Flaws in FirewallsFun with DMZsAuthentication lssuesTrust at the PerimeterIntranetsChapter 2Basic ConnectivityWhat Happened to TTYWhat Is the Baudot Code? UNIX to UNIX CoPy (UUCP)SLIP and PPPRloginVirtual Terminal Protocol (Telnet) . Columbia University' Kermit: A Secure and ReliableTelnet ServerTelnet Services Security ConsiderationsA Systems Manager Approach to Network SecurityTelnet Session Security ChecklistTrivial File Transfer Protocol (TFTP)TFTP Security ConsiderationsFile Transfer Protocol (FTP)Some of the Challenges of Using FirewallsIncreasing Security on lP NetworksChapter 3 Cryptography: Is It Enough? IntroductionSymmetric Key Encryption (Private Keys)Data Encryption Standard (DES)International Data Encryption Afgorithm (IDEA)CASTSkipjackRC2/RC4Asymmetric Key Encryption/Public Key EncryptionRSADigital Signature Standard (DSS)Message Digest AlgorithmsMD2, MD4, and MD5Secure Hash Standard/Secure Hash Algorithm(SHS/SHA)CertificatesCertificate ServersKey ManagementKerberosKey-Exchange Algorithms (KEA…… Part 2 Firewall Implementations and LimitationsPart 3 Firewall Resource GuideAppendix A List of Firewall Resellers and Related ToolsGlossaryBibliographyIndex
展开全部
商品评论(0条)
暂无评论……
书友推荐
编辑推荐
返回顶部
中图网
在线客服