-
内容大纲
本书不仅深入剖析了信息安全的理论基础,更紧密结合了实际应用场景,帮助读者理解并掌握网络安全的核心技术和最佳实践。通过本书的学习,读者能够深入了解网络安全的重要性,掌握网络安全的基本知识和技能,为构建安全、可靠的网络环境提供有力支持。 -
作者介绍
-
目录
Section 1 Overview of security and information security
Project 1 Understand the basic concepts of information security
Task 1.1 Understand the concepts of information and information security
Subtask 1.1.1 Understand the definition of information and information security
Subtask 1.1.2 Grasp the attributes of security
Subtask 1.1.3 Understand the development of information security
Subtask 1.1.4 Case study of information security
Subtask 1.1.5 Cause analysis of information security incidents
Subtask 1.1.6 Understand the significance of building information security
Task 1.2 Understand information security risks and management
Subtask 1.2.1 Physical risks analysis
Subtask 1.2.2 Information risks analysis
Subtask 1.2.3 System risks analysis
Subtask 1.2.4 Application risks analysis
Subtask 1.2.5 Network risks analysis
Subtask 1.2.6 Management risks analysis
Subtask 1.2.7 Understand the importance of information security management
Subtask 1.2.8 Understand the development status of information security management
Project 2 Understand the computer networks
Task 2.1 TCP/IP architecture analysis
Subtask 2.1.1 Analysis of typical campus network architecture
Subtask 2.1.2 Introduction of OSI reference model
Subtask 2.1.3 Understand OSI seven-layer model
Subtask 2.1.4 Understand TCP/IP model
Subtask 2.1.5 Master the functions of each layer of TCP/IP protocol stack
Subtask 2.1.6 Analysis of encapsulation and decapsulation process of TCP/IP protocol stack
Subtask 2.1.7 Understand the five-tuple
Task 2.2 Understand network layer protocols
Subtask 2.2.1 Working process analysis of ARP protocol
Subtask 2.2.2 Working process analysis of ICMP
Subtask 2.2.3 Understand routing protocols
Subtask 2.2.4 Working process analysis of OSPF
Subtask 2.2.5 Working process analysis of SNMP
Subtask 2.2.6 Working process analysis of NTA
Subtask 2.2.7 Working process analysis of NetStream
Task 2.3 Understand transport layer protocols
Subtask 2.3.1 Working process analysis of TCP protocol
Subtask 2.3.2 Working process analysis of UDP protocol
Task 2.4 Understand application layer protocols
Subtask 2.4.1 Working process analysis of DNS protocol
Subtask 2.4.2 Working process analysis of FTP protocol
Subtask 2.4.3 Working process analysis of HTTP protocol
Subtask 2.4.4 The analysis of SMTP/POP3/IMAP-mail sending and receiving mechanism
Project 3 Master the configuration of common network equipment
Task 3.1 Understand common network e
Section 5 Fundamentals of security operations and analysis
同类热销排行榜
- C语言与程序设计教程(高等学校计算机类十二五规划教材)16
- 电机与拖动基础(教育部高等学校自动化专业教学指导分委员会规划工程应用型自动化专业系列教材)13.48
- 传感器与检测技术(第2版高职高专电子信息类系列教材)13.6
- ASP.NET项目开发实战(高职高专计算机项目任务驱动模式教材)15.2
- Access数据库实用教程(第2版十二五职业教育国家规划教材)14.72
- 信号与系统(第3版下普通高等教育九五国家级重点教材)15.08
- 电气控制与PLC(普通高等教育十二五电气信息类规划教材)17.2
- 数字电子技术基础(第2版)17.36
- VB程序设计及应用(第3版十二五职业教育国家规划教材)14.32
- Java Web从入门到精通(附光盘)/软件开发视频大讲堂27.92
推荐书目
-

孩子你慢慢来/人生三书 华人世界率性犀利的一枝笔,龙应台独家授权《孩子你慢慢来》20周年经典新版。她的《...
-

时间简史(插图版) 相对论、黑洞、弯曲空间……这些词给我们的感觉是艰深、晦涩、难以理解而且与我们的...
-

本质(精) 改革开放40年,恰如一部四部曲的年代大戏。技术突变、产品迭代、产业升级、资本对接...
[
