TA的每日心情 | 开心 2018-4-8 22:14 |
---|
签到天数: 1 天 [LV.1]初学乍练
普通会员

- 积分
- 5517
|
java自学网(www.javazx.com)-java论坛,java电子书推荐:《 计算机网络(英文版第5版)》
, j* V( ~2 l: `- c- Ajava电子书推荐理由:全球**有权威性和经典性的计算机网络教材 作者Andrew S. Tanenbaum是国际知名的计算机科学家 更多经典图书 : 《深入理解计算机系统(英文版第2版)》点击进入 《编译原理(英文版第2版)》点击进入 《数据结构与算法分析――C语言描述(英文版第2版)》点击进入 《Java编程思想(英文版第4版)》点击进入 《Linux内核设计与实现(英文版.第3版)》点击进入
% A1 V9 P1 E0 [" i$ @
/ k% x0 u+ ?$ w# h7 N作者:Andrew S.Tanenbaum David J.Wetherall. E; I' [& c7 T: S! p$ a1 A
出版社:机械工业出版社/ D* H7 @( s% V
出版时间:2011-10-01 ' J* W M" W! w5 J* p3 y
书籍价格:76.20元/ F# F _( d: K- a: M5 _
3 q6 v! i1 R6 E- P' R

2 U; k: z4 k- k2 v
3 E" c6 e7 @: ?6 [3 J% T$ Q
+ _# F5 s+ Q) c! \; p' M" Yjava电子书目录:1 e) _( d3 N4 [$ m9 w
1 introduction
. E- p4 p0 x8 v2 ^% F3 k 1.1 uses of computer networks,% ^% }3 `( \& w9 V
1.1.1 business applications,
( H# ^3 _2 ~% H: u% f/ w 1.1.2 home applications, F4 G# p7 o; f
1.1.3 mobile users,! r' j) n5 |5 D, a* W) H6 G
1.1.4 social issues,- [0 d$ N) P# o- g7 D
1.2 network hardware,2 |4 z* k9 @4 b$ T/ a% _
1.2.1 personal area networks,
$ z; p# v$ _9 r8 e5 Q1 b 1.2.2 local area networks,0 a( g, i: X4 n" w! c
1.2.3 metropolitan area networks,2 g( R8 }6 U- Q/ f( h) x
1.2.4 wide area networks,
4 }. y' k7 ~, i6 D8 o0 @2 r, I4 Q( M) N 1.2.5 internetworks, S1 s- u/ B$ E* g, X
1.3 network software,$ e; \0 a! j* R) J
1.3.1 protocol hierarchies,3 I7 Y( `6 I! G0 O$ a! k
1.3.2 design issues for the layers,
3 v( O7 C# w2 T3 d( [, j7 o 1.3.3 connection-oriented versus connectionless service,
' X$ X9 O7 W# z) |9 A0 u 1.3.4 service primitives,
) X' w0 U4 w6 i+ ^) ~6 P% d 1.3.5 the relationship of services to protocols,
6 t0 m7 V) E- L; j) D' m) f 1.4 reference models,
4 p6 m( q; @0 m: L8 F 1.4.1 the osi reference model,
% ?+ B8 Z" C( C$ T% m3 u 1.4.2 the tcp/ip reference model,/ b `! o% Z5 h4 j
1.4.3 the model used in this book,, S, _1 o- R* K, i# {- f
1.4.4 a comparison of the osi and tcp/ip reference models,$ K Y6 |( l/ ] ?7 K) l
1.4.5 a critique of the osi model and protocols,8 x. Q! r5 c9 z1 P/ |
1.4.6 a critique of the tcp/ip reference model,4 k1 `+ I* F4 O* F/ P ?4 _- ]
1.5 example networks,
/ @4 I8 r) M% k4 `& i$ K 1.5.1 the internet,
) u, P% L1 i! c8 \) _ 1.5.2 third-generation mobile phone networks,: |; f! }4 s: i' n T
1.5.3 wireless lans: 802.11,4 f! t K# B4 S% }% Z
1.5.4 rfid and sensor networks,+ @. a o# D, d5 l: j
1.6 network standardization,' o# {) V5 F4 H5 E
1.6.1 who’s who in the telecommunications world,
/ F: D/ a) E* P$ T 1.6.2 who’s who in the international standards world,9 d# P+ n4 G; K) |
1.6.3 who’s who in the internet standards world,
" t/ C2 L2 @+ |' y, g# A* `; w8 s 1.7 metric units,% q# \* m4 c1 V: Q
1.8 outline of the rest of the book,
- U5 g% D. P/ p# G5 V& C 1.9 summary,2 R8 a$ M: [2 n2 b4 n. s
2 the physical layer
9 ^+ M( I" {8 D0 V( n 2.1 the theoretical basis for data communication,1 o; M* N Q+ e! B/ c+ L0 |! z# {6 ^
2.1.1 fourier analysis,. }0 c# k: m5 E$ _9 o+ M
2.1.2 bandwidth-limited signals,
/ v9 r5 A$ O% ?. [7 ^ 2.1.3 the maximum data rate of a channel,
7 p4 B( Q& o% C2 i" _- ~ 2.2 guided transmission media,
- u# v; Z/ ?7 C# @8 z6 C 2.2.1 magnetic media,. p0 J* R/ v% v* I7 O; G
2.2.2 twisted pairs,
- h! o8 p! n/ W0 S0 Y/ C) k 2.2.3 coaxial cable,
) n- f- z6 |' M% O( K% Q% g 2.2.4 power lines, r, }5 F2 b* f/ m
2.2.5 fiber optics,; P- g$ C9 K; u% a* l" ~$ r
2.3 wireless transmission,4 ` f0 ?$ n" @( y4 Y
2.3.1 the electromagnetic spectrum,; J) [! L0 R( q, I8 i# @7 I# K2 c
2.3.2 radio transmission,
) a {; t4 e, `' N& T 2.3.3 microwave transmission,2 ^, z2 v4 ~9 p$ t5 a! @3 L
2.3.4 infrared transmission,7 C. d6 z$ U" T7 i" \, ?( o
2.3.5 light transmission,
! Y9 N. r/ x% F }( l contents?
0 q$ |; F/ S$ _) T$ Q 2.4 communication satellites,6 L& t! S7 S1 I) c, B
2.4.1 geostationary satellites,. ]8 M* B% J' O7 I
2.4.2 medium-earth orbit satellites,# E2 H6 W9 Z H: C
2.4.3 low-earth orbit satellites,* ~' s: }: F$ O4 O; j& A$ A5 o; M
2.4.4 satellites versus fiber,0 d7 Z. Q$ H3 O/ |( D
2.5 digital modulation and multiplexing,7 O8 N; C# F; Y% y
2.5.1 baseband transmission,
$ R; j/ g: Q& s! R4 A; N1 h 2.5.2 passband transmission,
1 c) l% Q p! @/ q 2.5.3 frequency division multiplexing,8 C5 C1 ]1 I" H9 p* i
2.5.4 time division multiplexing,
l1 Z& {1 ~* d2 m 2.5.5 code division multiplexing,
% M0 w9 p% C' x+ D 2.6 the public switched telephone network,/ R' U2 V6 ^/ k1 V4 ]
2.6.1 structure of the telephone system,
/ b- h" z' q0 {' h% F' {) L 2.6.2 the politics of telephones,
' i1 U" k+ i# n* h 2.6.3 the local loop: modems, adsl, and fiber,
6 U1 O! _& J) z, g, `3 h 2.6.4 trunks and multiplexing,
- m2 p* Z' G5 ~/ Q9 {1 R; x" a 2.6.5 switching,
3 |+ u+ T+ k: L; ^% M' q 2.7 the mobile telephone system,1 H7 O( O( c% P2 a4 S1 {) z
2.7.1 first-generation (1g) mobile phones: analog voice,
M( J& _% G8 r( @ 2.7.2 second-generation (2g) mobile phones: digital voice,
3 I' q4 f# A( L% w5 _1 |8 z 2.7.3 third-generation (3g) mobile phones: digital voice anddata,
. O0 S, ?2 Q$ _- S! @. r+ D. ] 2.8 cable television,0 o- r7 l8 a2 S, ^# b* L5 }. T
2.8.1 community antenna television,
3 C( ?' _2 x, X( X$ b 2.8.2 internet over cable,* F5 C% H6 L j, D4 D
2.8.3 spectrum allocation,: O. s. }5 k$ |* m' a
2.8.4 cable modems,
# F, ], g5 @1 z- p) A3 I 2.8.5 adsl versus cable,
6 s) A( C! K( ?" W 2.9 summary, b+ ^4 [! ^$ @
3 the data link layer
z3 q; F+ |1 _( i( j$ u C 3.1 data link layer design issues,+ G( j9 ~/ [+ W7 H2 k* g1 C
3.1.1 services provided to the network layer,% f8 t0 d' ^' R$ I
3.1.2 framing,
, [3 w% u8 l- U9 I 3.1.3 error control,
8 O8 ^# N) U( q, l. F$ R 3.1.4 flow control,: `7 u- w2 d# [/ R
3.2 error detection and correction,
3 _$ I5 Q6 b0 m$ ?9 C4 b 3.2.1 error-correcting codes,7 T7 Y4 y1 u8 y9 F
3.2.2 error-detecting codes,$ ^8 I+ a9 c5 \/ J5 g
3.3 elementary data link protocols,
7 u+ i& a- c l. F4 h7 x, [. Z 3.3.1 a utopian simplex protocol,# A$ b# I/ v$ l( @7 n8 f) R- G2 O+ E
3.3.2 a simplex stop-and-wait protocol for an error-freechannel,
/ I, }) F2 z, q# V0 a 3.3.3 a simplex stop-and-wait protocol for a noisy channel,
* {6 L3 n3 p2 W 3.4 sliding window protocols,
& X8 a1 q v, p* _- l0 k4 C# m4 P 3.4.1 a one-bit sliding window protocol,! N8 E! h* k; D
3.4.2 a protocol using go-back-n,
$ U& [* T+ R8 d 3.4.3 a protocol using selective repeat,
7 d. Y9 p4 F8 e4 w 3.5 example data link protocols,
! K! ^ J) d" `! V' { 3.5.1 packet over sonet,0 Q2 S, {/ m% O5 l# b
3.5.2 adsl (asymmetric digital subscriber loop),* W/ n2 M& B2 r
3.6 summary,
4 A r6 ]) U" J4 the medium access control sublayer
; W3 U; y4 T9 F 4.1 the channel allocation problem,: `! i( G/ \5 b& `3 \: h% d
4.1.1 static channel allocation,
2 y) _: G/ q# l& o+ S* N 4.1.2 assumptions for dynamic channel allocation,! ~3 H H5 t" ~1 b0 Q+ d: A
4.2 multiple access protocols,
6 K- e: {+ u) m$ B 4.2.1 aloha,
% a9 w F) F( h1 R2 u( F 4.2.2 carrier sense multiple access protocols,+ `4 [ t9 P* }
4.2.3 collision-free protocols,' g: C4 ^) q5 r, }/ n. l& |2 [; p
4.2.4 limited-contention protocols,
( r3 I) T1 E1 T' h+ H4 A 4.2.5 wireless lan protocols,. V. u4 |+ Z1 u
4.3 ethernet,
2 V% X% `- n5 a S9 g1 ~ 4.3.1 classic ethernet physical layer,
# q& N1 p6 U9 n' k. D5 u/ k2 ?9 Z 4.3.2 classic ethernet mac sublayer protocol,
! A: o2 k$ l6 H: }; `4 O9 K/ { 4.3.3 ethernet performance,: e; y5 R8 |# y/ |$ _
4.3.4 switched ethernet,4 P- @$ f2 E% y' I& k/ k
4.4.4 the 802.11 frame structure,( C6 X) H7 F; x0 K+ L1 q/ J" A
4.4.5 services,4 x$ |( c# \$ F: k! K/ K' `
4.5 broadband wireless,
6 y9 M" N" W i0 Y 4.5.1 comparison of 802.16 with 802.11 and 3g,( x) P0 u' }5 l* T7 ^+ M' G
4.5.2 the 802.16 architecture and protocol stack,0 i5 X: N1 T5 k" k
4.5.3 the 802.16 physical layer," o2 `9 c, Q: `
4.5.4 the 802.16 mac sublayer protocol,% k8 E4 r8 x& k. v1 x
4.5.5 the 802.16 frame structure,1 b6 _2 }5 z. h1 i5 ^1 ?$ O* i
4.6 bluetooth,
+ s, j. L6 N" H( f# v0 [ 4.6.1 bluetooth architecture,* }5 y' F7 A7 V& c/ E6 u7 d: w O
4.6.2 bluetooth applications,2 ]# V- `+ W8 U, ^) `' f
4.6.3 the bluetooth protocol stack,
" g7 M/ L' p8 U 4.6.4 the bluetooth radio layer," ]- r W6 B' E L3 l6 o
4.6.5 the bluetooth link layers,
9 W' C) {1 w- @; b# l 4.6.6 the bluetooth frame structure,
9 C$ k* M0 y4 v 4.7 rfid,
" O# ^) g; \7 M 4.7.1 epc gen 2 architecture,# Z+ W% w$ I8 ?# b
4.7.2 epc gen 2 physical layer,
* `- c+ R( d+ R4 a* @ 4.7.3 epc gen 2 tag identification layer,/ L9 a1 A% I- v8 D8 J4 ^
4.7.4 tag identification message formats,& v \5 j% x9 Y5 |; B
4.8 data link layer switching,8 H: w* |- D) p. N
4.8.1 uses of bridges,1 B8 M$ e! ?/ p* s# L4 `
4.8.2 learning bridges," @9 Z: i% z9 D; ` }4 a
4.8.3 spanning tree bridges, }' G' q* h" R, P% E% J
4.8.4 repeaters, hubs, bridges, switches, routers, andgateways,
3 G( J+ W& W# P: u0 E7 Z 4.8.5 virtual lans,
! d% Y( g. n A- l. r) y, n 4.9 summary,
5 N, s. x- r- d, O# t3 T+ W5 the network layer6 n6 K8 `5 Z+ ~' _& j
5.1 network layer design issues,0 k1 a+ |! D. q; Q( M
5.1.1 store-and-forward packet switching,( g5 k- P1 ]9 B; s; c V
5.1.2 services provided to the transport layer,4 _. N5 @* d: j' ~; G
5.1.3 implementation of connectionless service,$ j0 q" G! [! \# p }/ q
5.1.4 implementation of connection-oriented service,( h) p+ O/ t" G5 U% H6 {( i( N( W5 [# \
5.1.5 comparison of virtual-circuit and datagram networks,7 }3 c) a+ {" i) O6 {+ F$ K
5.2 routing algorithms,
+ V, R5 Q& B: l$ s 5.2.1 the optimality principle,
5 F1 G5 o$ \/ i3 E% ^; {3 W5 W 5.2.2 shortest path algorithm," Y2 X# Y: \$ Q: N# [0 W1 m
5.2.3 flooding,8 V8 H. A- P/ c. t* {1 b
5.2.4 distance vector routing,
% {, M% ]# a4 s8 H- s1 Y, e 5.2.5 link state routing,
/ l; m% D1 {: v. L5 S+ z 5.2.6 hierarchical routing,( y( z. S6 Y; N1 r8 A% a/ s7 V
5.2.7 broadcast routing,( P! e- h+ k: }( {
5.2.8 multicast routing,
% E2 }8 t' T/ @9 d 5.2.9 anycast routing,# e& W* \! O; ~3 ]
5.2.10 routing for mobile hosts,
: L/ F5 x1 K2 Z/ c9 Z 5.2.11 routing in ad hoc networks,6 q8 u- ~1 z8 t: W
5.3 congestion control algorithms,* S' m5 V" X3 P/ }. U( A7 r2 W
5.3.1 approaches to congestion control,
9 c: f, T2 \1 o0 I& {- ?8 X% { 5.3.2 traffic-aware routing,0 g1 f8 {) X: {. O7 m/ K
5.3.3 admission control,
# B2 ?6 }+ i8 H% E 5.3.4 traffic throttling,
) p' W- \- x. a4 X2 x 5.3.5 load shedding,
& O2 y! v4 p" }2 X+ Q7 ~ 5.4 quality of service,
) i7 D+ x, j' P 5.4.1 application requirements,
( d: M$ H9 r/ q& S6 m! H* W5 v& E 5.4.2 traffic shaping,5 A8 P# n- P0 F# |/ G6 z
5.4.3 packet scheduling,
1 V2 }4 I6 G) S/ _ 5.4.4 admission control,
5 U3 I; f+ Q: x. }( X0 A3 k% Y 5.4.5 integrated services, c0 L. u3 G9 W/ A
5.4.6 differentiated services,
5 c; B: o$ \" `( ~1 d 5.5 internetworking,
1 x/ | R7 `( c4 P2 @ 5.5.1 how networks differ,, ]2 ]8 i# G/ b) ?
5.5.2 how networks can be connected,
8 _. c( W- z; }) k4 c/ a0 d 5.5.3 tunneling,0 g3 P5 |0 D" q; X
5.5.4 internetwork routing,
* H( ~4 P6 s* o; K' U" | 5.5.5 packet fragmentation,
7 e" q. F y: Q, V! l* A4 C 5.6 the network layer in the internet," O I. n# l( H6 ]& v' `
5.6.1 the ip version 4 protocol,
. s! d0 Y' D3 V! j& l 5.6.2 ip addresses," G' s3 T7 E J
5.6.3 ip version 6,
( K' Z; g1 x+ o8 y- `/ s1 n3 E3 z 5.6.4 internet control protocols,* T* ~! M1 @% [" j; v6 J) I# E. c
5.6.5 label switching and mpls,7 ~, Z! Z6 o" D1 G& G \( w$ f% B& S
5.6.6 ospf—an interior gateway routing protocol,
* i$ S {3 b' m) I6 D 5.6.7 bgp—the exterior gateway routing protocol,
% K* R7 Z, |0 }- a y4 @9 y 5.6.8 internet multicasting,
1 {0 U4 z. e7 F" c8 p$ d 5.6.9 mobile ip,) V- q4 r; _: S$ k( @0 a/ F
5.7 summary,: Z1 S6 S1 \/ ?8 Y) O
6 the transport layer
) {. v2 \# y/ i- f- W! D% N, `$ a 6.1 the transport service,
) z9 `2 l# h2 v+ u- K" {+ g 6.1.1 services provided to the upper layers,* H' z; G$ l% k
6.1.2 transport service primitives,2 s u' _- Q# l& l: X
6.1.3 berkeley sockets,
4 Z/ `, |, @" o& u6 ? 6.1.4 an example of socket programming: an internet fileserver,, y+ p/ ?) d: A
6.2 elements of transport protocols,1 m) h% d; o, I+ u9 C# @0 S
6.2.1 addressing,* V5 Y' l: y8 S8 d' W; b
6.2.2 connection establishment,
/ N" k. F5 o* g" J" E& f; M 6.2.3 connection release,
3 |: i% y$ Y: A# c 6.2.4 error control and flow control,7 ]8 D$ g R$ R4 ^
6.2.5 multiplexing,) C8 M: ~, T( z/ h
6.2.6 crash recovery,# X) `8 E. o: J: ^7 Q7 S; S
6.3 congestion control,
5 W1 @3 i0 P1 t7 r% K; p7 B% V' E) M 6.3.1 desirable bandwidth allocation,, V1 q6 {* G. j9 f. k8 {
6.3.2 regulating the sending rate,% v# u: _' X7 \5 R
6.3.3 wireless issues,4 @; d+ Q) z5 V: r4 o' F. q
6.4 the internet transport protocols: udp,( l( d4 B' w" L* _5 A% L& S: i2 C
6.4.1 introduction to udp,
* S" E: J, m% W$ ]5 X% n4 L 6.4.2 remote procedure call,: q5 K' r( C; M, E" K2 w/ \
6.4.3 real-time transport protocols,
' c8 y) J( W" L: W" n 6.5 the internet transport protocols: tcp, $ Z- z/ X, N: v8 h, H- Z# S2 G( r4 w
6.5.1 introduction to tcp, 3 s0 U2 h/ J. x' f6 Y7 K, i T
6.5.2 the tcp service model, : a4 T4 n `' [7 W7 {
6.5.3 the tcp protocol, 3 X$ f* b: Z3 c3 i5 a" N/ o' M
6.5.4 the tcp segment header,
& i+ P/ H& Q) D; A1 J* ?, H% Q 6.5.5 tcp connection establishment, 9 [8 H9 ^) m& Y5 c( g
6.5.6 tcp connection release, . z3 n& ] |! ~0 L, E& o
6.5.7 tcp connection management modeling, 0 _5 l* i2 d7 T+ |6 C
6.5.8 tcp sliding window,
( D" ?- `# K3 T0 d 6.5.9 tcp timer management, ( R5 H9 j3 D H! z* l3 |) ?
6.5.10 tcp congestion control,
! l. O( U: L* F: [6 I" s 6.5.11 the future of tcp, G& ~+ k( W- W/ I
6.6 performance issues, , \, f$ \ u: ]# l! t. R8 l% @
6.6.1 performance problems in computer networks,
# C+ Y+ @/ N5 p: i- j$ z 6.6.2 network performance measurement,
+ m( U5 b8 J7 b3 N, {7 D# v 6.6.3 host design for fast networks, 0 T! g5 \' ]- V7 ]' X; W" K% f3 R* b
6.6.4 fast segment processing,
4 F' C' t$ m' ~5 R: s8 h 6.6.5 header compression,
0 W+ H) B6 @5 i 6.6.6 protocols for long fat networks,# G. O: D% @6 G$ p
6.7 delay-tolerant networking,( { `6 U8 B' k# R3 Z
6.7.1 dtn architecture,
* Z$ S# Q, f' N- O+ | 6.7.2 the bundle protocol,4 @$ Q+ S `* R+ e( Z) h+ O
6.8 summary,- \, @7 [5 B8 i- y% H5 l5 J
7 the application layer
4 i* n/ [& B+ s% }2 \* r6 w 7.1 dns—the domain name system,
8 T" ^8 \/ }) n- K* H1 B 7.1.1 the dns name space,( ?" a+ B" s1 `( v
7.1.2 domain resource records,' }- c1 G/ f' v8 f
7.1.3 name servers,4 c1 m( R8 Y4 l
7.2 electronic mail,
1 g) C$ E/ A0 \. v' H% U [ 7.2.1 architecture and services,8 m1 g8 e6 B* M% P2 f( I
7.2.2 the user agent,
) z5 F8 v" H* m& n, t 7.2.3 message formats,' \1 i4 M& d7 z+ d
7.2.4 message transfer,
% O2 J! y0 a: p4 |6 r 7.2.5 final delivery,
5 L9 \2 V, D: W* @+ i 7.3 the world wide web,7 |- O9 s, p t3 z5 f, {
7.3.1 architectural overview,
; o. y: m! v b- _ 7.3.2 static web pages, ]2 |4 z3 E1 p6 ]. D2 C8 v( x4 R
7.3.3 dynamic web pages and web applications,
+ {; H: w" d* D 7.3.4 http—the hypertext transfer protocol,
) U6 n" o0 M! c2 r 7.3.5 the mobile web," Z% c9 F) ]1 Z) \0 i. `
7.3.6 web search,
/ F; N7 _8 t9 o$ O0 |! Y 7.4 streaming audio and video,5 d* `0 o# C. ^$ N' \. z
7.4.1 digital audio, m' X4 A9 |, t' T7 [
7.4.2 digital video,2 f3 |0 k$ `9 ^! t" @7 N% @
7.4.3 streaming stored media,+ w/ z% i* D. d. j3 Y+ R+ z H
7.4.4 streaming live media,
7 e6 o1 g; W+ x) Z& N 7.4.5 real-time conferencing,( u% S! P, W+ n: R; M
7.5 content delivery,
$ j4 ]9 {/ J b( [" v. n5 D6 G 7.5.1 content and internet traffic,
( ?4 c& |6 A7 k* b5 `* B- h$ P# H% s6 F 7.5.2 server farms and web proxies,
2 n* x; U1 ~- J7 _ 7.5.3 content delivery networks,
5 ?1 T" I1 v7 I3 o* B 7.5.4 peer-to-peer networks,: O" r7 R- s4 R
7.6 summary,
5 I+ H" U* s; r2 A Q! n# o- M8 network security; f& A, E: l, T4 J
8.1 cryptography,* r) m5 r. d, c% Q l7 W% q( g) G
8.1.1 introduction to cryptography,3 n0 t& A, b* Y/ m& D `
8.1.2 substitution ciphers,$ P; C8 p1 p4 r
8.1.3 transposition ciphers,9 C9 [' p) W7 c# c# d
8.1.4 one-time pads,0 [: c5 `& U7 }3 Q0 N
8.1.5 two fundamental cryptographic principles,
* R0 e2 `5 V& N! |$ y5 S" P4 a 8.2 symmetric-key algorithms,& b8 D4 z% J# u M1 A" _
8.2.1 des—the data encryption standard,
3 X$ e3 p( M, I @9 n 8.2.2 aes—the advanced encryption standard,
; X" U( p- y/ K+ m. V8 w 8.2.3 cipher modes,
1 v1 l' ?4 X, v, R8 Q+ R7 \# I 8.2.4 other ciphers,
[9 e' K; ~/ C8 G2 R6 K9 @- L 8.2.5 cryptanalysis,7 o p- z" D( [+ U. L( [
20?contents
6 Y! Y- C: y m+ x' E1 G3 m! ^/ b 8.3 public-key algorithms,
& s4 I+ g+ V* v' A6 O 8.3.1 rsa,
: ]. J. b8 K9 A 8.3.2 other public-key algorithms,2 h6 g3 a- g/ s" H! B5 v$ U
8.4 digital signatures,
5 H" ~. N' F K6 m7 ?9 k, }3 A% N 8.4.1 symmetric-key signatures,
( X3 j# H, C3 H 8.4.2 public-key signatures,
" g5 y( ^. a( L: y+ H, ^ N3 D- X2 s 8.4.3 message digests,
# S6 L! g2 ?8 Q5 h( i 8.4.4 the birthday attack,
" [7 K' @, m; ~/ A {6 N2 s3 x 8.5 management of public keys,+ a/ q8 l, W; ^- Q$ G7 y$ N
8.5.1 certificates,% @' P w) ^4 G# K, y
8.5.2 x.509,/ F8 n; G2 [% X- q
8.5.3 public key infrastructures,
& E4 u* a! V, W2 F3 K: p* ` 8.6 communication security,3 O: J7 L4 ~7 [4 Y; V& P8 j
8.6.1 ipsec,7 l! L, T1 S. E! d" G/ g; N
8.6.2 firewalls,
9 S# J2 E. K7 v0 a$ j' L' K1 e 8.6.3 virtual private networks,
: [8 d4 W! r0 ]2 O8 G4 B% v! H 8.6.4 wireless security,8 s3 x1 q) ~' Z( ]6 M
8.7 authentication protocols,3 z7 o6 [8 c9 g
8.7.1 authentication based on a shared secret key,4 d: h/ k4 _/ c
8.7.2 establishing a shared key: the diffie-hellman keyexchange,
2 n9 G9 O7 Z& G( y" f" Q 8.7.3 authentication using a key distribution center,7 M# ]: w1 F. l# H& d( s; u
8.7.4 authentication using kerberos,! H8 q3 k0 ?% l" v8 b' M2 J' x
8.7.5 authentication using public-key cryptography,! K8 O, G, }* y
8.8 email security,! k; s0 i' B4 p$ @% _; w
8.8.1 pgp—pretty good privacy,
# e; j8 W& @4 W |$ x0 X% L8 M, n 8.8.2 s/mime,
1 X' ^/ i% x5 Y! ]& N4 K 8.9 web security,
, S4 M! B& ?+ ~5 _3 @ 8.9.1 threats,
3 W" G* T9 C5 G( O+ t$ _3 N U 8.9.2 secure naming,1 q/ o" ]( Q3 D/ w! p' s( K
8.9.3 ssl—the secure sockets layer,
2 n6 F3 d z. A& j3 H0 |7 @ 8.9.4 mobile code security,( J( s/ c- Z) p: s4 e0 {% x( ]2 n. Q
8.10 social issues,
' a/ V0 A8 Z9 [7 }7 W* C2 ?# q8 I 8.10.1 privacy,. @" `9 Q2 v7 \
8.10.2 freedom of speech,1 ]$ M( y5 O. Z9 w* _
8.10.3 copyright,
- A& k. O P5 | 8.11 summary,
/ _6 ]& o2 ]1 c1 ?4 u: L9 reading list and bibliography& ]5 d+ O, E; E- M+ u
9.1 suggestions for further reading, \3 z1 j: Z: V# v( \( B* `
9.1.1 introduction and general works,
5 \1 V4 d# S# O* S/ ` 9.1.2 the physical layer,
2 y& z# ]4 u! c- w' _% n 9.1.3 the data link layer,
+ e g. R( L* y u! k# K 9.1.4 the medium access control sublayer,
" |0 F; [8 x% J) ]4 j 9.1.5 the network layer,
6 j6 M; [* F& D# ~8 H 9.1.6 the transport layer,: a7 j* T$ b# A# z
9.1.7 the application layer,
0 s, b% F( M: \+ x) i, P 9.1.8 network security,3 f5 [8 d! F0 L2 _9 i9 ^! Z8 [+ w
9.2 alphabetical bibliography,5 ~; S/ e3 _5 Y7 K
index1 Z7 U. P: f$ C, A/ Z8 D, {
, f+ y9 f4 ?. k) a# e: `/ JJava资料百度网盘下载地址链接(百度云):java自学网(javazx.com) 计算机网络(英文版第5版) PDF 高清 电子书 百度云.rar【密码回帖可见】
! \* O+ d% q0 Z- Q+ u5 O9 r
2 o5 b( b3 z0 r+ k$ i( ?% H( E; _! v. b3 S
7 m9 [" V' z2 Z/ Y, V l! X6 z. H i0 q+ Y, I- ^
|
|