TA的每日心情 | 开心 2018-4-8 22:14 |
---|
签到天数: 1 天 [LV.1]初学乍练
普通会员
- 积分
- 5517
|
java自学网(www.javazx.com)-java论坛,java电子书推荐:《 计算机网络(英文版第5版)》
& c8 s( m7 S5 d: Xjava电子书推荐理由:全球**有权威性和经典性的计算机网络教材 作者Andrew S. Tanenbaum是国际知名的计算机科学家 更多经典图书 : 《深入理解计算机系统(英文版第2版)》点击进入 《编译原理(英文版第2版)》点击进入 《数据结构与算法分析――C语言描述(英文版第2版)》点击进入 《Java编程思想(英文版第4版)》点击进入 《Linux内核设计与实现(英文版.第3版)》点击进入
/ J& z# T, q- Y6 q" B8 `' S
4 _7 j q+ l7 T/ ?. ~/ ]作者:Andrew S.Tanenbaum David J.Wetherall
- h j% y& d2 p C5 {) T& A2 Y出版社:机械工业出版社
6 ^( k2 Q# e: y, ]5 D) e' c出版时间:2011-10-01 8 z, u# F' C- j! @/ S6 G
书籍价格:76.20元& ^# k: m! H# ^
' M4 Q2 ~. ^; f) r( f/ e
- Z- n# z8 I- _' P+ M; [, p. f% r1 M( l' U
" P$ P% x6 _# F
java电子书目录:
! G7 ]' K% w7 J) v9 ^1 introduction
6 V" T( a5 m3 u; \: a. U' l 1.1 uses of computer networks,: P0 }- N2 k, `1 `7 n, ~
1.1.1 business applications,* i7 t O- v: {& \- _( m
1.1.2 home applications,
! u i" p& |$ j' l: e* p% D 1.1.3 mobile users,
0 a, Y8 h1 ]* p, N! { 1.1.4 social issues,
6 H' T% ?- Q! t4 W& @8 q5 O: A/ r 1.2 network hardware,) W4 F# K+ v% w( S B# V
1.2.1 personal area networks,! }4 @' i, T' v6 v+ h2 F# d
1.2.2 local area networks,1 W/ T2 t6 e) `2 e. z
1.2.3 metropolitan area networks,
F0 L9 _5 ]3 O, J0 h9 h* { 1.2.4 wide area networks,
* s( V: i6 d- p# `! H0 z6 w' u 1.2.5 internetworks,# c' K/ q1 Z/ c; e* t+ n' C8 {$ p' _$ @7 M
1.3 network software,# w l/ ]4 X5 e7 L8 r. E; m' H
1.3.1 protocol hierarchies,
B+ D9 r Q5 x7 |6 a' Y/ C" j. [- y 1.3.2 design issues for the layers,9 V& @1 [; O" `: E- ^% \
1.3.3 connection-oriented versus connectionless service,4 W: k2 K) |2 L9 b8 G! X7 p1 y
1.3.4 service primitives,
* A+ D3 J9 H( M 1.3.5 the relationship of services to protocols,
; C: n# R! k% v- R% _* @" f2 b 1.4 reference models,
* T& C# `0 D2 i4 E- g' D 1.4.1 the osi reference model,! u2 E* \4 I# g# r8 t8 n
1.4.2 the tcp/ip reference model,
# [3 G {% \5 ]9 k 1.4.3 the model used in this book,
. F& J2 L* r: }2 e2 S5 e 1.4.4 a comparison of the osi and tcp/ip reference models," @0 o3 D8 r+ C; I3 `* q2 @+ m
1.4.5 a critique of the osi model and protocols,2 v5 B9 H! g) ^2 E$ y6 e% @% ^- x
1.4.6 a critique of the tcp/ip reference model,
9 I5 e3 k( D/ a: Q6 I7 o 1.5 example networks,
$ E/ u/ @# \: w. z4 ^7 S$ |; n 1.5.1 the internet,
' I2 E t+ D2 ^/ }7 P: G& N 1.5.2 third-generation mobile phone networks,
2 b3 {4 S- W! h- |0 L4 g 1.5.3 wireless lans: 802.11,
* Q6 }! S3 n& P5 w* V! { 1.5.4 rfid and sensor networks,# U9 q6 O L7 N7 C: X5 \# H: j
1.6 network standardization,
1 C! V0 x2 d* w: N% R 1.6.1 who’s who in the telecommunications world,. c$ g$ j M/ `( ~3 O% K
1.6.2 who’s who in the international standards world,
4 a+ _7 ~% [, T: \ 1.6.3 who’s who in the internet standards world,/ z B, [% x0 ?, J, @
1.7 metric units,! ] Q6 `1 X+ l" u3 x# k
1.8 outline of the rest of the book,
6 d. O4 i' C# t' y 1.9 summary,5 U0 o! S' s+ L$ o2 y$ L c
2 the physical layer
. s* I+ ~6 G$ z3 r 2.1 the theoretical basis for data communication,
6 }. Y5 P; W: @; s" n) k6 M1 I3 l) h 2.1.1 fourier analysis,2 w: [3 J0 l: d& o0 K' C5 k0 y
2.1.2 bandwidth-limited signals,! E# E9 b4 c; Y
2.1.3 the maximum data rate of a channel,: d) [; C+ P) v& L3 a
2.2 guided transmission media,
" k5 u- X) i$ w n& G 2.2.1 magnetic media,; X8 b! Y5 k! X/ G$ x& G0 U/ s
2.2.2 twisted pairs,! ]( D. K7 X' @9 _( J& L7 l9 v& S
2.2.3 coaxial cable,' {" P( P6 M( v9 H+ G& j
2.2.4 power lines,( C& W/ ]& r1 D
2.2.5 fiber optics,
# Z6 r, i5 u2 I- Q6 w% z5 F 2.3 wireless transmission,
! {$ ~# \; t: X) p: J, j) { 2.3.1 the electromagnetic spectrum,
5 B2 }' u8 @* Y2 ` 2.3.2 radio transmission,( Y9 k9 \' V% e* p& Z8 u
2.3.3 microwave transmission,6 m4 c( t$ y+ a2 w4 S% a
2.3.4 infrared transmission,) E: \! A) p: Q8 D- K
2.3.5 light transmission,
2 E4 w! ]& ]8 B/ r contents?
$ i3 y7 x& F1 ^7 x. Y$ S: x 2.4 communication satellites,2 p+ E: \/ ~2 d% @0 T/ o! w5 \
2.4.1 geostationary satellites,) Y; a8 x6 j- T, }. F) \' }
2.4.2 medium-earth orbit satellites,
4 A" H$ ]# j9 a 2.4.3 low-earth orbit satellites,
' g4 f5 b; s2 F" I% e3 j; @ 2.4.4 satellites versus fiber,
3 o. R, R: k# \' B 2.5 digital modulation and multiplexing,
5 D% `, E+ x/ o 2.5.1 baseband transmission,8 \! g( S! Y% i6 P' N+ W
2.5.2 passband transmission,
+ ^; M3 G/ j9 ~1 u( ] 2.5.3 frequency division multiplexing,0 o q+ d6 |/ ~7 [) X
2.5.4 time division multiplexing,3 F4 V+ b9 A3 k
2.5.5 code division multiplexing,
- J4 A* J4 L/ S' F: @/ ? 2.6 the public switched telephone network,, Y9 r- s6 b! l2 |) X" T! t* P- y
2.6.1 structure of the telephone system,. M g, [% s* P! T& J" e
2.6.2 the politics of telephones,5 w. h% W G: d5 M' U; }
2.6.3 the local loop: modems, adsl, and fiber,6 I7 B- g P, F1 p
2.6.4 trunks and multiplexing,
* J+ f3 B- T$ M) m 2.6.5 switching,
9 T# h1 ]5 u z9 Q) g 2.7 the mobile telephone system,
3 k/ P4 L4 }5 d W( G% f; f 2.7.1 first-generation (1g) mobile phones: analog voice,
" B9 Z" T1 Y4 H 2.7.2 second-generation (2g) mobile phones: digital voice,5 W' ~8 i2 V& G# d) K
2.7.3 third-generation (3g) mobile phones: digital voice anddata,
1 O8 m0 f1 l. c& I9 i' A' [, T4 I2 | 2.8 cable television,
- u* l: b O1 g 2.8.1 community antenna television,1 a/ k* P2 M6 F c3 a) }
2.8.2 internet over cable,
1 U8 x8 K+ K) m' x2 n: X 2.8.3 spectrum allocation,# n8 ^$ _, P% {7 v6 d6 ^# y$ Z
2.8.4 cable modems,
: U4 d. f, G0 `: E% j 2.8.5 adsl versus cable,
" r; V4 o- M# V% O& I 2.9 summary,
( D) Y; O5 g- N3 the data link layer
8 ^; }3 d' b& _( R 3.1 data link layer design issues,
, j$ Z: L- T$ t/ K 3.1.1 services provided to the network layer,' Y: d' A3 U8 U% w
3.1.2 framing,
# Q- w" P( o1 g5 a$ g- D 3.1.3 error control,: c: f0 W n9 `4 w; |" A
3.1.4 flow control," g- W& P* o1 k* P* ^
3.2 error detection and correction,5 J x" W8 _# y& `
3.2.1 error-correcting codes,5 w& f. K9 }$ v; c# E
3.2.2 error-detecting codes,. x* l1 I4 z% `* ~
3.3 elementary data link protocols,
9 o! v7 s% q; u; [! G6 C# W 3.3.1 a utopian simplex protocol," t* M, P5 h( C. w
3.3.2 a simplex stop-and-wait protocol for an error-freechannel,0 U5 a' l' ? w9 W
3.3.3 a simplex stop-and-wait protocol for a noisy channel,1 F" W, x4 _9 b- e7 y- H
3.4 sliding window protocols,
2 c2 t! p/ L( c' A8 o9 \' \ 3.4.1 a one-bit sliding window protocol,
, x6 f2 K9 f- ^# A$ e# u5 |/ P 3.4.2 a protocol using go-back-n,. O4 n6 j( \9 o& S; X% E
3.4.3 a protocol using selective repeat,
o9 L' T9 b# c- Q# s 3.5 example data link protocols, V0 w E# P. T% Z* d5 g
3.5.1 packet over sonet,0 w# P: i( n: f3 B1 n
3.5.2 adsl (asymmetric digital subscriber loop),
2 C" n# q) _- T 3.6 summary,
( N" h4 G; O7 E& q4 the medium access control sublayer, |5 w/ n" {; M m" M) X, _ `6 y: ~ j
4.1 the channel allocation problem,$ S8 P& u% E2 b, R3 W: H
4.1.1 static channel allocation,
- I1 P' y: o' n 4.1.2 assumptions for dynamic channel allocation,, u1 v3 w9 U7 O [# k) n
4.2 multiple access protocols,
6 [: q( d* x' F& N8 K+ m; l 4.2.1 aloha,
) J- B) d4 t, w. d 4.2.2 carrier sense multiple access protocols,
1 ?; h' E# n+ P7 _ 4.2.3 collision-free protocols,
* v5 Y7 r. ?1 x4 c. O4 V7 q0 {. D 4.2.4 limited-contention protocols,9 m Y5 I/ ?3 h6 \# R
4.2.5 wireless lan protocols,- [: v4 e* Q* m3 s, G- I
4.3 ethernet,
/ } ~! F$ @" v! O4 u 4.3.1 classic ethernet physical layer,
, @# s& E* d/ b n- g 4.3.2 classic ethernet mac sublayer protocol,5 \0 y4 m; i0 K
4.3.3 ethernet performance,5 p7 g( u; L% b' [$ y4 m! ?+ X
4.3.4 switched ethernet,
# C% \- d) v; `+ N4 I 4.4.4 the 802.11 frame structure,
8 |' b7 b! \5 b, h& A 4.4.5 services,2 o* O* u1 A+ d: j& P, |, F8 o
4.5 broadband wireless,
( B: [! @8 Z1 ]& ~ 4.5.1 comparison of 802.16 with 802.11 and 3g,1 C( }/ x$ p1 a
4.5.2 the 802.16 architecture and protocol stack,/ v# z/ r! t" _) z. U
4.5.3 the 802.16 physical layer,
* k9 W" R# [. H5 l' N8 a 4.5.4 the 802.16 mac sublayer protocol,. H2 @$ Z8 f3 ?2 H
4.5.5 the 802.16 frame structure,: j7 P2 n" Q. H: R; l, l) u5 `
4.6 bluetooth,- T" d' j+ G) f+ V0 H+ l# w: ?, ?
4.6.1 bluetooth architecture,/ G$ g5 V( r: |' z: J. T
4.6.2 bluetooth applications,5 _6 ?* X: f1 z4 Y$ A6 |
4.6.3 the bluetooth protocol stack,( r0 R! H' @+ P6 W+ L
4.6.4 the bluetooth radio layer,
" y. S$ S- `3 d; `! `, h" X 4.6.5 the bluetooth link layers,2 P8 i6 V3 A8 S
4.6.6 the bluetooth frame structure,. x! @: Z: u4 o
4.7 rfid,
+ I9 y5 w" S5 C8 K5 V( @ 4.7.1 epc gen 2 architecture,6 Y1 p% }$ }7 b5 i! \7 m$ w& y
4.7.2 epc gen 2 physical layer,0 E+ z# _. U8 K1 q
4.7.3 epc gen 2 tag identification layer,* B7 ]& {) l |
4.7.4 tag identification message formats,
' b9 F G6 @/ D8 V4 |3 X 4.8 data link layer switching,
( X6 H' L5 M9 |6 ~( u 4.8.1 uses of bridges,
# E! F. J( {1 i 4.8.2 learning bridges,5 c$ b" ^3 B& J
4.8.3 spanning tree bridges,5 c& ~6 _; q, b# G5 m+ ^
4.8.4 repeaters, hubs, bridges, switches, routers, andgateways,* r, n( s$ @2 Z9 }. D H
4.8.5 virtual lans,4 J! ~- h0 P4 |0 m. Z& O
4.9 summary,
/ x: p5 [: v5 j% T3 n9 K* }/ b5 the network layer
: z" p" O0 ^* P0 ] 5.1 network layer design issues,) P- ^& {' w, [. y4 A
5.1.1 store-and-forward packet switching,, o5 a$ I1 h, q3 c' o2 O& A& ]# P
5.1.2 services provided to the transport layer,
9 J- H# q- a1 U9 x 5.1.3 implementation of connectionless service,5 X+ e8 g# R& h% K7 h* d
5.1.4 implementation of connection-oriented service,! w) e1 I' l3 p
5.1.5 comparison of virtual-circuit and datagram networks,
$ x9 Z3 g0 \3 U4 E' W; n9 q 5.2 routing algorithms,
5 B, V1 o0 O& [( Z1 q 5.2.1 the optimality principle,
; F0 t) R( D5 e* e* A% T7 z3 u 5.2.2 shortest path algorithm,( B5 l2 G8 k9 ]1 \
5.2.3 flooding,
+ _2 b: P0 @6 f 5.2.4 distance vector routing,% A" B6 S" J6 ?" P
5.2.5 link state routing, y, M7 g6 t2 K9 P7 Q+ S* T
5.2.6 hierarchical routing,
1 ?8 |% }2 v) K% m 5.2.7 broadcast routing,5 _, O; {" m: ~2 U
5.2.8 multicast routing,
L+ `) |! t2 m; t 5.2.9 anycast routing,$ m8 Q$ {+ M' y: F/ H
5.2.10 routing for mobile hosts,
6 f% C/ M3 f" ]. A 5.2.11 routing in ad hoc networks,3 V9 Z- S9 h6 @' l. X
5.3 congestion control algorithms,& e* ?1 W9 X' t9 k
5.3.1 approaches to congestion control,
% Z3 m k7 T2 f; C$ T 5.3.2 traffic-aware routing,
% r/ z' y E0 }" I 5.3.3 admission control, I7 y+ C; C& \, s
5.3.4 traffic throttling,# W# D u( B5 c$ `# F
5.3.5 load shedding,$ m v7 e2 m! M" z1 @" ~- c7 m
5.4 quality of service,
8 A/ U: n& e! M H& M3 G) f5 @ ? 5.4.1 application requirements,
7 |. l0 y: s7 k8 {) f3 f5 T 5.4.2 traffic shaping,1 @1 G/ J" c% ~9 c1 S* ]- m" D y
5.4.3 packet scheduling,# F0 K+ ^ H& T
5.4.4 admission control,
5 z% P2 r f: _# U% F' g/ S( F' \" Z 5.4.5 integrated services,2 \3 Q% k9 W7 G
5.4.6 differentiated services,
# ]' g4 H- B* N) v& H 5.5 internetworking,
) o. }: z, E# M ?4 p 5.5.1 how networks differ,3 o" i" G+ z1 d, v+ g, d
5.5.2 how networks can be connected,
5 j% D/ s: |' Y% T% z3 y 5.5.3 tunneling,
. V# k. s$ U+ F3 N- F; q 5.5.4 internetwork routing,
: @$ R" E# n+ I, u' Y0 \ 5.5.5 packet fragmentation,0 C; _1 e. X( q U
5.6 the network layer in the internet,, T, |9 Y& |) L( c1 n( X4 @. h, m/ w
5.6.1 the ip version 4 protocol,* i! \6 L; W/ e
5.6.2 ip addresses,9 `% C3 `# i# X
5.6.3 ip version 6,
( t$ h% ^3 t' I5 W5 u 5.6.4 internet control protocols,
; Y( |+ u! B8 ?$ |0 y. c0 T 5.6.5 label switching and mpls,# J/ F: @% m+ N4 F. q
5.6.6 ospf—an interior gateway routing protocol,
( l: o# Y2 v' G1 }& l 5.6.7 bgp—the exterior gateway routing protocol,
' A7 e' }% j& w 5.6.8 internet multicasting,
! k' r! l# |% M' G& U 5.6.9 mobile ip,3 y5 ~7 D/ q9 s1 t* [% n8 C
5.7 summary,
" x1 x! D2 j! m, ?; F0 G% |1 t, _6 the transport layer: s! Q% g& V% M. C
6.1 the transport service,
6 W, Y( R* v- K. G$ R, w$ L" p0 E 6.1.1 services provided to the upper layers,6 i+ b/ j) L$ d |
6.1.2 transport service primitives,
% `4 |6 ]( B$ c' b. ? 6.1.3 berkeley sockets,
) R+ O; p, ^8 }3 B 6.1.4 an example of socket programming: an internet fileserver,
R" X4 u# w; m7 P0 `& R 6.2 elements of transport protocols,
- C6 Z+ o4 u6 r& s' [& \7 { 6.2.1 addressing,
5 o2 p( v* E V 6.2.2 connection establishment,2 v3 `6 }$ a- o% i9 n: e
6.2.3 connection release,% W% _' {; m2 i* `7 a' i' W" Q
6.2.4 error control and flow control,
+ W z2 M" q$ ~' y; g$ Q" ? 6.2.5 multiplexing,
' { u }! [" _ O( P2 g7 m' M 6.2.6 crash recovery,; k0 o/ O& z* r% u( Y5 t+ A
6.3 congestion control,3 ^. @$ c7 G( c+ y9 ]8 r
6.3.1 desirable bandwidth allocation,' I& y2 s8 ]+ ]) D3 u) t1 }8 ]
6.3.2 regulating the sending rate,
7 Q4 e" N9 B7 m1 y 6.3.3 wireless issues,
, Z, W7 U& T7 Y# j% Y6 P- r- u 6.4 the internet transport protocols: udp,
# k; A1 d$ g% q( U4 E( f 6.4.1 introduction to udp,, \6 D! W+ m3 }3 D
6.4.2 remote procedure call,1 e6 ]+ B, e8 d) n9 |4 z0 _
6.4.3 real-time transport protocols,
) E$ J3 G4 ?* l u | 6.5 the internet transport protocols: tcp,
9 N% g; m' ^, A, p4 R) [ 6.5.1 introduction to tcp, " P2 \0 f4 M/ v" z* d$ o
6.5.2 the tcp service model, . `0 T9 f5 \# g7 \
6.5.3 the tcp protocol, t' L: |! U' E
6.5.4 the tcp segment header,
6 U7 W( ^4 Q3 z 6.5.5 tcp connection establishment, - x1 ^* E# V, S& O+ N
6.5.6 tcp connection release,
' F9 w( X9 s C2 w 6.5.7 tcp connection management modeling,
: R8 N, s5 B4 n! N+ D# Z 6.5.8 tcp sliding window,
1 I+ R- G* m1 @ 6.5.9 tcp timer management, ! W/ H. u8 B4 C0 O. {% f" q
6.5.10 tcp congestion control, % ?& t6 n, I2 X$ N" Q: f
6.5.11 the future of tcp, 7 D0 e0 b/ s1 {3 D. Z" Y0 D& r" `
6.6 performance issues,
/ F2 G( \4 ?. Y) n2 Q* y 6.6.1 performance problems in computer networks,
4 U% r3 k9 @- D) D5 T& w* I( B 6.6.2 network performance measurement,
5 R7 x* t$ l/ e; ^6 n 6.6.3 host design for fast networks, $ K, ~: H! s0 E
6.6.4 fast segment processing,
6 N7 v! ^: J0 Y* P 6.6.5 header compression, 3 ~' H% ^, X( Q- ]
6.6.6 protocols for long fat networks,
7 o* i* w- S0 T5 m' N' }! u% l& G! a 6.7 delay-tolerant networking,
& e9 @# u+ ?% P 6.7.1 dtn architecture,
& c* L& M, @ L- \ 6.7.2 the bundle protocol,
4 ~% K y% ]" f 6.8 summary,# _7 d6 z$ L3 b& ^$ q/ n6 s6 T
7 the application layer) s. Z& E8 f6 e2 N2 M6 k
7.1 dns—the domain name system,
" T, E9 G" T7 w5 J: _0 p9 ?% Z 7.1.1 the dns name space,
; s, T% B7 D' L+ N 7.1.2 domain resource records,3 ]- O7 l4 Y3 n5 V! H& x- D
7.1.3 name servers,, m+ n$ j: {6 @5 t. D- ~
7.2 electronic mail,5 R0 r* i2 D1 D
7.2.1 architecture and services,
4 J4 n1 q9 Z5 D! ?* O2 k 7.2.2 the user agent,
/ M s( e% v9 @ 7.2.3 message formats,8 t0 c, [4 c' ?$ h
7.2.4 message transfer,. n) Y9 ]: O1 F0 D! Y
7.2.5 final delivery,. e. L! o6 Y/ E; P/ C+ M
7.3 the world wide web,5 Q$ Q* A3 e3 \, y
7.3.1 architectural overview,
$ l+ {7 n( K- e2 Y# [1 X8 N 7.3.2 static web pages,
" p2 v9 h' |' u9 V( P2 P8 m 7.3.3 dynamic web pages and web applications,4 S4 A- C1 Y) [: f% c4 A
7.3.4 http—the hypertext transfer protocol,: b6 {( \$ v* _3 Q, a( _
7.3.5 the mobile web,# T* j3 v# s# n5 F' j
7.3.6 web search,! j- s& H* I* u* ~7 q
7.4 streaming audio and video,
u! S: h) E0 `% z4 ?" B 7.4.1 digital audio,
1 t1 k- h7 H5 e 7.4.2 digital video, r) w7 n" j* V6 o' Y/ T
7.4.3 streaming stored media,. x8 X( D8 a& \/ B& {( G8 B6 j
7.4.4 streaming live media, ^: v7 L$ x, Y, G
7.4.5 real-time conferencing,
; M6 N3 L) ^! Z2 P$ {, j) ] 7.5 content delivery,
# N' u) D! g! u0 @' u 7.5.1 content and internet traffic,
0 | K( v% H% n. M Y0 e 7.5.2 server farms and web proxies,5 w; [2 ?, v+ t/ W
7.5.3 content delivery networks,
* R q& [/ P4 m 7.5.4 peer-to-peer networks,% D1 v" Z7 Q# C% J5 R8 T4 C8 k
7.6 summary,
, ?4 G7 |+ L4 T5 \% X+ e# m8 network security
* a5 d+ d2 A1 H! ~ 8.1 cryptography,! {3 s4 w$ N) Q; ]/ o" C% M
8.1.1 introduction to cryptography,
: F3 t2 @5 H. t: T: y# } 8.1.2 substitution ciphers,
/ Q6 }7 K( a: n: [: d* _* H 8.1.3 transposition ciphers,/ |- `/ P8 ^* i9 ~. L
8.1.4 one-time pads,+ Z. |% M% I4 x6 P; i6 G+ }5 P
8.1.5 two fundamental cryptographic principles,
- n: k% ~( Y) X! [ c- l+ k. y 8.2 symmetric-key algorithms,2 T+ u! N1 m) c9 T( s
8.2.1 des—the data encryption standard,
8 t N% [8 d w: N+ k* }7 r( t 8.2.2 aes—the advanced encryption standard,
3 W: ]0 R- h8 b) ?1 m; c 8.2.3 cipher modes,( f _- ~, E5 w0 a, [/ Q
8.2.4 other ciphers,
' X# k' Z- j, m# I- d2 F, J. g 8.2.5 cryptanalysis,; O2 j! k8 H2 ]( t8 r
20?contents
2 O6 ?% q7 ?( J7 p: \ 8.3 public-key algorithms, c! T6 V, X( h& f5 w
8.3.1 rsa,9 g9 A8 I3 f% `4 ]1 u
8.3.2 other public-key algorithms,
( V; X5 A4 p& B# H; K7 L 8.4 digital signatures,
9 R/ J5 o5 n3 C7 X3 q! ~ 8.4.1 symmetric-key signatures,
' z7 Y4 S7 e8 G 8.4.2 public-key signatures,3 e" p, J0 L. j( G* V6 c
8.4.3 message digests,* F: y5 T8 x1 e, i, ~- b! x
8.4.4 the birthday attack,
! a! @- z8 r, A5 ]+ m+ ~$ | 8.5 management of public keys,* ?, t- I7 X. x
8.5.1 certificates,) j ]- w' L- @' h
8.5.2 x.509,8 k" _) j4 h. q3 x0 g h& Y
8.5.3 public key infrastructures,! `9 [0 T3 E ~0 s4 B7 W8 w
8.6 communication security,5 H1 {! n& G% Y+ s3 @
8.6.1 ipsec,
+ @9 ]" a5 O2 c* g" U 8.6.2 firewalls,0 M2 S6 v6 H4 t1 r
8.6.3 virtual private networks,
" r/ z: O$ U1 o! O4 z 8.6.4 wireless security,
" r* ^; p( Z$ w0 A- b! D 8.7 authentication protocols,
$ m+ D& f. l* W: Z4 L 8.7.1 authentication based on a shared secret key,
) C, m- r8 X5 X7 | 8.7.2 establishing a shared key: the diffie-hellman keyexchange,5 i+ |+ M0 M; l2 }: e8 [
8.7.3 authentication using a key distribution center,2 s1 m3 B& w' G) V% @; s) w
8.7.4 authentication using kerberos,
& y' }9 v+ @- b8 f 8.7.5 authentication using public-key cryptography,2 L9 q, n2 x2 `+ H
8.8 email security,
, X* o3 V# q$ A! u 8.8.1 pgp—pretty good privacy,4 w5 `) f7 e# w' [7 I' M- p# Q2 [
8.8.2 s/mime,$ w1 |. ~5 a+ `1 r L! ~
8.9 web security,$ X! B d$ L- x6 o5 U0 I+ ?
8.9.1 threats,
& e0 n: S9 @3 m# s4 X H. W8 C 8.9.2 secure naming,+ ?5 |% ?* N& i7 ]
8.9.3 ssl—the secure sockets layer,5 H! u: R) }6 N0 C
8.9.4 mobile code security,
! v0 ~9 x' I9 H; k1 K7 z 8.10 social issues,
3 F) d- Y) m4 M; G* a. T 8.10.1 privacy,
8 z+ F' \# {, _; ] 8.10.2 freedom of speech,
; R } r. C- }% n3 r* f1 }6 \ 8.10.3 copyright,* [3 M0 b0 @9 W
8.11 summary,
$ `4 j/ U4 d/ ?( V4 E: F9 reading list and bibliography
, ]- V( |+ M3 y9 s+ J. d 9.1 suggestions for further reading,: h! \ O+ l$ [
9.1.1 introduction and general works,# |' N7 \2 j' D" z5 V8 P
9.1.2 the physical layer,
5 c9 [( V9 m. j1 y6 i$ Q9 ~; S 9.1.3 the data link layer, G% q( I9 \6 [! d0 U+ ~
9.1.4 the medium access control sublayer,
% M5 I+ H) K: q0 X1 p) I 9.1.5 the network layer,8 L: g# I c2 X+ F' j
9.1.6 the transport layer,7 Q( B6 L- y# V" D
9.1.7 the application layer,
/ |8 T( X( d2 S 9.1.8 network security,5 ?) E7 @7 c% o( t) o
9.2 alphabetical bibliography,
& Y* {5 s. I, D1 C/ z: S/ p T |- Jindex
L. K+ o7 _% F1 d- a
. V( f6 J( A$ J2 b& CJava资料百度网盘下载地址链接(百度云):java自学网(javazx.com) 计算机网络(英文版第5版) PDF 高清 电子书 百度云.rar【密码回帖可见】
1 E4 B$ A/ o* X! w+ e- R7 r/ v, x( ~
2 p+ e+ t8 `; C2 w# J" F
2 K/ L5 r( W& f e: N
* p0 B+ Q. O" z- x+ n- o |
|