»óǰ»ó¼¼Á¤º¸
ISBN |
9780137056323(013705632X) |
Âʼö |
743ÂÊ |
¾ð¾î |
English |
Å©±â |
180(W) X 234(H) X 40(T) (mm) |
ÆÇ |
5/E 5th revised edition. International Version. |
Á¦º»ÇüÅ |
Paperback |
»ðÈÀ¯¹« |
»ðÈÀÖÀ½ |
Ã¥¼Ò°³
ÀÌ Ã¥ÀÌ ¼ÓÇÑ ºÐ¾ß
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. A practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues. Visit Stallings' Author Web Site at http://williamstallings.com/Crypto5e.html for student and instructor resources and his Computer Science Student Resource site at http://williamstallings.com/StudentSupport.html Password-protected instructor resources can be accessed from this page by clicking on the Resources Tab to view downloadable files. (Registration required) Supplements include: Solutions, PowerPoint slides, Projects, Encryption Lab Exercises.
ÀÌ Ã¥ÀÇ »óǰ±¸¼º
* ÇØ´ç »óǰÀÇ »ó¼¼±¸¼ºÁ¤º¸¸¦ ÁغñÁßÀÔ´Ï´Ù.
|
¸ñÂ÷
PREFACE
Chapter 0 Reader's Guide
Chapter 1 Overview
PART ONE SYMMETRIC CIPHERS
Chapter 2 Classical Encryption Techniques
Chapter 3 Block Ciphers and the Data Encryption Standard
Chapter 4 Basic Concepts in Number Theory and Finite Fields
Chapter 5 Advanced Encryption Standard
Chapter 6 Block Cipher Operation
Chapter 7 Pseudorandom Number Generation and Stream Ciphers
PART TWO ASYMMETRIC CIPHERS
Chapter 8 More Number Theory
Chapter 9 Public-Key Cryptography and RSA
Chapter 10 Other Public-Key Cryptosystems
PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
Chapter 11 Cryptographic Hash Functions
Chapter 12 Message Authentication Codes
Chapter 13 Digital Signatures
PART FOUR MUTUAL TRUST
Chapter 14 Key Management and Distribution
Chapter 15 User Authentication Protocols
PART FIVE NETWORK AND INTERNET SECURITY
Chapter 16 Transport-Level Security
Chapter 17 Wireless Network Security
Chapter 18 Electronic Mail Security
Chapter 19 IP Security
ONLINE CHAPTERS
PART SIX SYSTEM SECURITY
Chapter 20 Intruders
Chapter 21 Malicious Software
Chapter 22 Firewalls
PART SEVEN LEGAL AND ETHICAL ISSUES
Chapter 23 Legal and Ethical Issues
±³È¯/¹Ýǰ/ǰÀý¾È³»
¡Ø »óǰ ¼³¸í¿¡ ¹Ýǰ/±³È¯ °ü·ÃÇÑ ¾È³»°¡ ÀÖ´Â °æ¿ì ±× ³»¿ëÀ» ¿ì¼±À¸·Î ÇÕ´Ï´Ù. (¾÷ü »çÁ¤¿¡ µû¶ó ´Þ¶óÁú ¼ö ÀÖ½À´Ï´Ù.)
±³È¯/¹Ýǰ/ǰÀý¾È³»
¹Ýǰ/±³È¯¹æ¹ý |
¸¶ÀÌ·ë > ÁÖ¹®°ü¸® > ÁÖ¹®/¹è¼Û³»¿ª > ÁÖ¹®Á¶È¸ > ¹Ýǰ/±³È¯½Åû ,
[1:1»ó´ã>¹Ýǰ/±³È¯/ȯºÒ] ¶Ç´Â °í°´¼¾ÅÍ (1544-1900)
¡Ø ¿ÀǸ¶ÄÏ, ÇØ¿Ü¹è¼ÛÁÖ¹®, ±âÇÁÆ® ÁÖ¹®½Ã [1:1»ó´ã>¹Ýǰ/±³È¯/ȯºÒ]
¶Ç´Â °í°´¼¾ÅÍ (1544-1900) |
¹Ýǰ/±³È¯°¡´É ±â°£ |
º¯½É¹ÝǰÀÇ °æ¿ì ¼ö·É ÈÄ 7ÀÏ À̳», »óǰÀÇ °áÇÔ ¹× °è¾à³»¿ë°ú ´Ù¸¦ °æ¿ì ¹®Á¦Á¡ ¹ß°ß ÈÄ 30ÀÏ À̳» |
¹Ýǰ/±³È¯ºñ¿ë |
º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹Ýǰ/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã |
¹Ýǰ/±³È¯ ºÒ°¡ »çÀ¯ |
- ¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óǰ µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì
(´ÜÁö È®ÀÎÀ» À§ÇÑ Æ÷Àå ÈѼÕÀº Á¦¿Ü)
- ¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óǰ µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
¿¹) ÈÀåǰ, ½Äǰ, °¡ÀüÁ¦Ç°(¾Ç¼¼¼¸® Æ÷ÇÔ) µî
- º¹Á¦°¡ °¡´ÉÇÑ »óǰ µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì
¿¹) À½¹Ý/DVD/ºñµð¿À, ¼ÒÇÁÆ®¿þ¾î, ¸¸ÈÃ¥, ÀâÁö, ¿µ»ó Ⱥ¸Áý
- ¼ÒºñÀÚÀÇ ¿äû¿¡ µû¶ó °³º°ÀûÀ¸·Î ÁÖ¹® Á¦À۵Ǵ »óǰÀÇ °æ¿ì ((1)ÇØ¿ÜÁÖ¹®µµ¼)
- µðÁöÅÐ ÄÁÅÙÃ÷ÀÎ eBook, ¿Àµð¿ÀºÏ µîÀ» 1ȸ ÀÌ»ó ´Ù¿î·Îµå¸¦ ¹Þ¾ÒÀ» °æ¿ì
- ½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆÇ¸Å°¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
- ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡
ÇØ´çµÇ´Â °æ¿ì
(1) ÇØ¿ÜÁÖ¹®µµ¼ : ÀÌ¿ëÀÚÀÇ ¿äû¿¡ ÀÇÇÑ °³ÀÎÁÖ¹®»óǰÀ¸·Î ´Ü¼øº¯½É ¹× Âø¿À·Î ÀÎÇÑ Ãë¼Ò/±³È¯/¹Ýǰ ½Ã ¡®ÇØ¿ÜÁÖ¹® ¹Ýǰ/Ãë¼Ò ¼ö¼ö·á¡¯ °í°´ ºÎ´ã (ÇØ¿ÜÁÖ¹® ¹Ýǰ/Ãë¼Ò ¼ö¼ö·á : ¨ç¼¾çµµ¼-ÆÇ¸ÅÁ¤°¡ÀÇ 12%, ¨èÀϺ»µµ¼-ÆÇ¸ÅÁ¤°¡ÀÇ 7%¸¦ Àû¿ë)
|
»óǰ ǰÀý |
°ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ ǰÀý/Áö¿¬µÉ ¼ö ÀÖÀ¸¸ç, ǰÀý ½Ã °ü·Ã »çÇ׿¡ ´ëÇØ¼´Â À̸ÞÀϰú ¹®ÀÚ·Î ¾È³»µå¸®°Ú½À´Ï´Ù. |
¼ÒºñÀÚ ÇÇÇØº¸»ó
ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó |
- »óǰÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, ǰÁúº¸Áõ ¹× ÇÇÇØº¸»ó µî¿¡ °üÇÑ »çÇ×Àº
¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øÈ¸ °í½Ã)¿¡ ÁØÇÏ¿© 󸮵Ê
- ´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼ÀÇ
¼ÒºñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ
|