º»¹®³»¿ë ¹Ù·Î°¡±â
¹«·á¹è¼Û ¼Òµæ°øÁ¦

ÇØ¿ÜÁÖ¹® Cryptography and Network Security Principles and Practice

5/E 5th revised edition. International Version. | Paperback
Stallings, William ÁöÀ½ | Pearson Higher Education | 2010³â 03¿ù 15ÀÏ
  • Á¤°¡ : 114,330¿ø
    ÆÇ¸Å°¡ : 114,330¿ø [0%¡é 0¿ø ÇÒÀÎ] ÇÒÀÎÄíÆù ¹Þ±â
  • ÅëÇÕÆ÷ÀÎÆ® :
    [±âº»Àû¸³] 1,150¿ø Àû¸³ [1% Àû¸³] [Ãß°¡Àû¸³] 5¸¸¿ø ÀÌ»ó ±¸¸Å ½Ã 2õ¿ø Ãß°¡Àû¸³ ¾È³» [ȸ¿øÇýÅÃ] ½Ç¹öµî±Þ ÀÌ»ó, 3¸¸¿ø ÀÌ»ó ±¸¸Å ½Ã 2~4% Ãß°¡Àû¸³ ¾È³»
  • Ãß°¡ÇýÅà : µµ¼­¼Òµæ°øÁ¦ ¾È³» Ãß°¡ÇýÅà ´õº¸±â
  • ¹è¼Ûºñ : ¹«·á ¹è¼Ûºñ ¾È³»
  • [¹è¼ÛÀÏÁ¤] ±Ù¹«ÀÏ ±âÁØ 14ÀÏ À̳» Ãâ°í ¿¹Á¤ ¹è¼ÛÀÏÁ¤ ¾È³»
    ÇØ¿ÜÁÖ¹®µµ¼­´Â ÇØ¿Ü °Å·¡Ã³ »çÁ¤¿¡ ÀÇÇØ ǰÀý/Áö¿¬µÉ¼ö ÀÖ½À´Ï´Ù.
    ½ºÆä¼È¿À´õ µµ¼­³ª Àϼ­ÇØ¿ÜÁÖ¹®µµ¼­¿Í ÇÔ²² ÁÖ¹®½Ã ¹è¼ÛÀÏÀÌ ÀÌ¿¡ ¸ÂÃß¾î Áö¿¬µÇ¿À´Ï, ÀÌÁ¡ À¯ÀÇÇØÁֽñ⠹ٶø´Ï´Ù.

¾Ë¸³´Ï´Ù.

  • ÇØ¿ÜÁÖ¹®µµ¼­´Â °í°´´ÔÀÇ ¿äû¿¡ ÀÇÇØ ÁÖ¹®ÇÏ´Â '°³ÀÎ ¿À´õ' »óǰÀ̱⠶§¹®¿¡, ´Ü¼øÇÑ °í°´º¯½É/Âø¿À·Î ÀÎÇÑ Ãë¼Ò,¹Ýǰ, ±³È¯ÀÇ °æ¿ì 'ÇØ¿ÜÁÖ¹® ¹Ýǰ/Ãë¼Ò ¼ö¼ö·á'¸¦ ºÎ´ãÇÏ¼Å¾ß ÇÕ´Ï´Ù. ÀÌÁ¡ À¯ÀÇÇÏ¿© Áֽñ⠹ٶø´Ï´Ù. ¹Ýǰ/Ãë¼Ò ¼ö¼ö·á : (1)¼­¾çµµ¼­-ÆÇ¸ÅÁ¤°¡ÀÇ 12%, (2)ÀϺ»µµ¼­-ÆÇ¸ÅÁ¤°¡ÀÇ 7% (¹Ýǰ/Ãë¼Ò ¼ö¼ö·á´Â, ¼öÀÔÁ¦¹Ýºñ¿ë(FedEx¼ö¼Ûºñ¿ë, °ü¼¼»çºñ, º¸¼¼Ã¢°í·á, ³»·ú ¿î¼Ûºñ, Åë°üºñ µî)°ú Àç°í¸®½ºÅ©(¹ÌÆÇ¸Å ¸®½ºÅ©, ȯÂ÷¼Õ)¿¡ µû¸¥ ºñ¿ëÀ» Æ÷ÇÔÇϸç, ¼­¾çµµ¼­´Â ÆÇ¸ÅÁ¤°¡ÀÇ 12%, ÀϺ»µµ¼­´Â ÆÇ¸ÅÁ¤°¡ÀÇ 7%°¡ Àû¿ëµË´Ï´Ù.)
  • ¿Ü±¹µµ¼­ÀÇ °æ¿ì ÇØ¿ÜÁ¦°øÁ¤º¸·Î¸¸ ¼­ºñ½ºµÇ¾î ¹ÌÇ¥±âµÈ Á¤º¸°¡ ÀÖÀ» ¼ö ÀÖ½À´Ï´Ù. ÇÊ¿äÇÑ Á¤º¸°¡ ÀÖÀ»°æ¿ì 1:1 ¹®ÀÇ°Ô½ÃÆÇ À» ÀÌ¿ëÇÏ¿© ÁֽʽÿÀ.
»óǰ»ó¼¼Á¤º¸
ISBN 9780137056323(013705632X)
Âʼö 743ÂÊ
¾ð¾î English
Å©±â 180(W) X 234(H) X 40(T) (mm)
ÆÇ 5/E 5th revised edition. International Version.
Á¦º»ÇüÅ Paperback
»ðÈ­À¯¹« »ðÈ­ÀÖÀ½

Ã¥¼Ò°³

ÀÌ Ã¥ÀÌ ¼ÓÇÑ ºÐ¾ß

For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. A practical survey of cryptography and network security with unmatched support for instructors and students. In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience. The new edition has been updated to include coverage of the latest topics including expanded coverage of block cipher modes of operation, including authenticated encryption; revised and expanded coverage of AES; expanded coverage of pseudorandom number generation; new coverage of federated identity, HTTPS, Secure Shell (SSH) and wireless network security; completely rewritten and updated coverage of IPsec; and a new chapter on legal and ethical issues. Visit Stallings' Author Web Site at http://williamstallings.com/Crypto5e.html for student and instructor resources and his Computer Science Student Resource site at http://williamstallings.com/StudentSupport.html Password-protected instructor resources can be accessed from this page by clicking on the Resources Tab to view downloadable files. (Registration required) Supplements include: Solutions, PowerPoint slides, Projects, Encryption Lab Exercises.
ÀÌ Ã¥ÀÇ »óǰ±¸¼º
* ÇØ´ç »óǰÀÇ »ó¼¼±¸¼ºÁ¤º¸¸¦ ÁغñÁßÀÔ´Ï´Ù.

¸ñÂ÷

PREFACE

Chapter 0 Reader's Guide
Chapter 1 Overview

PART ONE SYMMETRIC CIPHERS

Chapter 2 Classical Encryption Techniques
Chapter 3 Block Ciphers and the Data Encryption Standard
Chapter 4 Basic Concepts in Number Theory and Finite Fields
Chapter 5 Advanced Encryption Standard
Chapter 6 Block Cipher Operation
Chapter 7 Pseudorandom Number Generation and Stream Ciphers


PART TWO ASYMMETRIC CIPHERS

Chapter 8 More Number Theory
Chapter 9 Public-Key Cryptography and RSA
Chapter 10 Other Public-Key Cryptosystems


PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS

Chapter 11 Cryptographic Hash Functions
Chapter 12 Message Authentication Codes
Chapter 13 Digital Signatures

PART FOUR MUTUAL TRUST

Chapter 14 Key Management and Distribution
Chapter 15 User Authentication Protocols

PART FIVE NETWORK AND INTERNET SECURITY

Chapter 16 Transport-Level Security
Chapter 17 Wireless Network Security
Chapter 18 Electronic Mail Security
Chapter 19 IP Security


ONLINE CHAPTERS
PART SIX SYSTEM SECURITY

Chapter 20 Intruders
Chapter 21 Malicious Software
Chapter 22 Firewalls


PART SEVEN LEGAL AND ETHICAL ISSUES

Chapter 23 Legal and Ethical Issues

°£´Ü¸®ºä (0)

µµ¼­ ±¸¸Å ÈÄ ¸®ºä¸¦ ÀÛ¼ºÇϽøé ÅëÇÕÆ÷ÀÎÆ®¸¦ µå¸³´Ï´Ù.
°áÁ¦ 90ÀÏ À̳» ÀÛ¼º ½Ã 50¿ø / ¹ß¼Û ÈÄ 5ÀÏ À̳» ÀÛ¼º ½Ã 100¿ø
(Æ÷ÀÎÆ®´Â ÀÛ¼º ÈÄ ´ÙÀ½ ³¯ Àû¸³µÇ¸ç, µµ¼­ ¹ß¼Û Àü ÀÛ¼º ½Ã¿¡´Â ¹ß¼Û ÈÄ ÀÍÀÏ¿¡ Àû¸³µË´Ï´Ù.
¿Ü¼­/eBook/À½¹Ý/DVD/GIFT ¹× ÀâÁö »óǰ Á¦¿Ü) ¾È³»
0/1000ÀÚ
ÄÁÅÙÃ÷Æò°¡
5Á¡ ¸¸Á¡¿¡
0Á¡ 1Á¡ 2Á¡ 3Á¡ 4Á¡ 5Á¡
À̹ÌÁö÷ºÎ
(ÆÄÀϿ뷮Àº 1MB ÀÌÇÏÀ̸ç, ÆÄÀÏÇü½ÄÀº jpg, jpeg ÆÄÀϸ¸ ¾÷·Îµå °¡´ÉÇÕ´Ï´Ù.)

    ±³È¯/¹Ýǰ/ǰÀý¾È³»

    ¡Ø »óǰ ¼³¸í¿¡ ¹Ýǰ/±³È¯ °ü·ÃÇÑ ¾È³»°¡ ÀÖ´Â °æ¿ì ±× ³»¿ëÀ» ¿ì¼±À¸·Î ÇÕ´Ï´Ù. (¾÷ü »çÁ¤¿¡ µû¶ó ´Þ¶óÁú ¼ö ÀÖ½À´Ï´Ù.)

    ±³È¯/¹Ýǰ/ǰÀý¾È³»
    ¹Ýǰ/±³È¯¹æ¹ý ¸¶ÀÌ·ë > ÁÖ¹®°ü¸® > ÁÖ¹®/¹è¼Û³»¿ª > ÁÖ¹®Á¶È¸ > ¹Ýǰ/±³È¯½Åû ,
    [1:1»ó´ã>¹Ýǰ/±³È¯/ȯºÒ] ¶Ç´Â °í°´¼¾ÅÍ (1544-1900)

    ¡Ø ¿ÀǸ¶ÄÏ, ÇØ¿Ü¹è¼ÛÁÖ¹®, ±âÇÁÆ® ÁÖ¹®½Ã [1:1»ó´ã>¹Ýǰ/±³È¯/ȯºÒ]
        ¶Ç´Â °í°´¼¾ÅÍ (1544-1900)
    ¹Ýǰ/±³È¯°¡´É ±â°£ º¯½É¹ÝǰÀÇ °æ¿ì ¼ö·É ÈÄ 7ÀÏ À̳»,
    »óǰÀÇ °áÇÔ ¹× °è¾à³»¿ë°ú ´Ù¸¦ °æ¿ì ¹®Á¦Á¡ ¹ß°ß ÈÄ 30ÀÏ À̳»
    ¹Ýǰ/±³È¯ºñ¿ë º¯½É ȤÀº ±¸¸ÅÂø¿À·Î ÀÎÇÑ ¹Ýǰ/±³È¯Àº ¹Ý¼Û·á °í°´ ºÎ´ã
    ¹Ýǰ/±³È¯ ºÒ°¡ »çÀ¯
    • ¼ÒºñÀÚÀÇ Ã¥ÀÓ ÀÖ´Â »çÀ¯·Î »óǰ µîÀÌ ¼Õ½Ç ¶Ç´Â ÈÑ¼ÕµÈ °æ¿ì
      (´ÜÁö È®ÀÎÀ» À§ÇÑ Æ÷Àå ÈѼÕÀº Á¦¿Ü)
    • ¼ÒºñÀÚÀÇ »ç¿ë, Æ÷Àå °³ºÀ¿¡ ÀÇÇØ »óǰ µîÀÇ °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
      ¿¹) È­Àåǰ, ½Äǰ, °¡ÀüÁ¦Ç°(¾Ç¼¼¼­¸® Æ÷ÇÔ) µî
    • º¹Á¦°¡ °¡´ÉÇÑ »óǰ µîÀÇ Æ÷ÀåÀ» ÈѼÕÇÑ °æ¿ì
      ¿¹) À½¹Ý/DVD/ºñµð¿À, ¼ÒÇÁÆ®¿þ¾î, ¸¸È­Ã¥, ÀâÁö, ¿µ»ó È­º¸Áý
    • ¼ÒºñÀÚÀÇ ¿äû¿¡ µû¶ó °³º°ÀûÀ¸·Î ÁÖ¹® Á¦À۵Ǵ »óǰÀÇ °æ¿ì ((1)ÇØ¿ÜÁÖ¹®µµ¼­)
    • µðÁöÅÐ ÄÁÅÙÃ÷ÀÎ eBook, ¿Àµð¿ÀºÏ µîÀ» 1ȸ ÀÌ»ó ´Ù¿î·Îµå¸¦ ¹Þ¾ÒÀ» °æ¿ì
    • ½Ã°£ÀÇ °æ°ú¿¡ ÀÇÇØ ÀçÆÇ¸Å°¡ °ï¶õÇÑ Á¤µµ·Î °¡Ä¡°¡ ÇöÀúÈ÷ °¨¼ÒÇÑ °æ¿ì
    • ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ ¼ÒºñÀÚº¸È£¿¡ °üÇÑ ¹ý·üÀÌ Á¤ÇÏ´Â ¼ÒºñÀÚ Ã»¾àöȸ Á¦ÇÑ ³»¿ë¿¡
      ÇØ´çµÇ´Â °æ¿ì
    (1) ÇØ¿ÜÁÖ¹®µµ¼­ : ÀÌ¿ëÀÚÀÇ ¿äû¿¡ ÀÇÇÑ °³ÀÎÁÖ¹®»óǰÀ¸·Î ´Ü¼øº¯½É ¹× Âø¿À·Î ÀÎÇÑ Ãë¼Ò/±³È¯/¹Ýǰ ½Ã ¡®ÇØ¿ÜÁÖ¹® ¹Ýǰ/Ãë¼Ò ¼ö¼ö·á¡¯ °í°´ ºÎ´ã (ÇØ¿ÜÁÖ¹® ¹Ýǰ/Ãë¼Ò ¼ö¼ö·á : ¨ç¼­¾çµµ¼­-ÆÇ¸ÅÁ¤°¡ÀÇ 12%, ¨èÀϺ»µµ¼­-ÆÇ¸ÅÁ¤°¡ÀÇ 7%¸¦ Àû¿ë)
    »óǰ ǰÀý °ø±Þ»ç(ÃâÆÇ»ç) Àç°í »çÁ¤¿¡ ÀÇÇØ ǰÀý/Áö¿¬µÉ ¼ö ÀÖÀ¸¸ç, ǰÀý ½Ã °ü·Ã »çÇ׿¡ ´ëÇØ¼­´Â
    À̸ÞÀϰú ¹®ÀÚ·Î ¾È³»µå¸®°Ú½À´Ï´Ù.
    ¼ÒºñÀÚ ÇÇÇØº¸»ó
    ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó
    • »óǰÀÇ ºÒ·®¿¡ ÀÇÇÑ ±³È¯, A/S, ȯºÒ, ǰÁúº¸Áõ ¹× ÇÇÇØº¸»ó µî¿¡ °üÇÑ »çÇ×Àº
      ¼ÒºñÀÚºÐÀïÇØ°á ±âÁØ (°øÁ¤°Å·¡À§¿øÈ¸ °í½Ã)¿¡ ÁØÇÏ¿© 󸮵Ê
    • ´ë±Ý ȯºÒ ¹× ȯºÒÁö¿¬¿¡ µû¸¥ ¹è»ó±Ý Áö±Þ Á¶°Ç, ÀýÂ÷ µîÀº ÀüÀÚ»ó°Å·¡ µî¿¡¼­ÀÇ
      ¼ÒºñÀÚ º¸È£¿¡ °üÇÑ ¹ý·ü¿¡ µû¶ó ó¸®ÇÔ

    ÀÌ ºÐ¾ßÀÇ º£½ºÆ®

    ´õº¸±â+

    ¹Ù·Î°¡±â

    • ¿ìÃø È®ÀåÇü ¹è³Ê 2
    • ¿ìÃø È®ÀåÇü ¹è³Ê 2

    ÃÖ±Ù º» »óǰ