TA的每日心情 | 开心 2018-4-8 22:14 |
---|
签到天数: 1 天 [LV.1]初学乍练
普通会员
- 积分
- 5517
|
java自学网(www.javazx.com)-java论坛,java电子书推荐:《 计算机网络(英文版第5版)》
- u ~/ W' N: p" b! t; R( c1 L# rjava电子书推荐理由:全球**有权威性和经典性的计算机网络教材 作者Andrew S. Tanenbaum是国际知名的计算机科学家 更多经典图书 : 《深入理解计算机系统(英文版第2版)》点击进入 《编译原理(英文版第2版)》点击进入 《数据结构与算法分析――C语言描述(英文版第2版)》点击进入 《Java编程思想(英文版第4版)》点击进入 《Linux内核设计与实现(英文版.第3版)》点击进入) R4 f+ ~' N3 C R0 H. p
5 H1 x/ m" Z, M. T9 S' l作者:Andrew S.Tanenbaum David J.Wetherall
) y# k0 l. l0 }: S( Q出版社:机械工业出版社* @( E; n. y' D8 X/ Y1 H# n2 N
出版时间:2011-10-01 " |$ i% m5 E+ d# l, ~ x2 o1 j
书籍价格:76.20元
- D- `4 C0 X( A; `
! S& ]: T; Q- q
5 [0 |: p7 p- c- S2 p6 L! A7 d7 W# k; t+ m) y
) |, K8 x) W1 e" }" |2 r1 s0 jjava电子书目录:/ B1 c" |; g9 `& ^' ~
1 introduction% P+ b2 c7 B: J7 i
1.1 uses of computer networks,& t* S% _% u* `3 p7 E
1.1.1 business applications,
! j- v/ t# V. S4 C0 A, W2 E7 M 1.1.2 home applications,
* e# @1 b% F' D" a& p2 G 1.1.3 mobile users,
" Y( l q( k) Z8 R4 a" D 1.1.4 social issues,2 h* G4 R; o6 _& ~
1.2 network hardware,
4 X7 u: q6 \" K 1.2.1 personal area networks,
& j+ Y6 Q( d5 W+ A# g, M. k 1.2.2 local area networks,2 @! F" f* _5 S% B0 u- ~3 w9 u
1.2.3 metropolitan area networks,7 p% p1 D/ N/ A- ?- Z8 Y
1.2.4 wide area networks,
) m- t# n7 f0 h9 ]# z- a# S 1.2.5 internetworks,
. H0 W" x& z: L3 D2 ]2 L3 B: ` 1.3 network software,; Z# s# v, I4 l$ K2 b. V+ K
1.3.1 protocol hierarchies,' q8 {* X8 @. A7 i
1.3.2 design issues for the layers,7 Z* v; g, {% `' `
1.3.3 connection-oriented versus connectionless service,
1 f9 U8 _+ `/ O( U. ]5 L, o 1.3.4 service primitives,' H& F8 U; U6 n3 ]
1.3.5 the relationship of services to protocols,
6 ~. R7 K" f! `" r 1.4 reference models,
/ ?) y5 Q' q1 }8 t$ K0 J0 J+ `( u 1.4.1 the osi reference model,
$ k6 ?& C' i9 o& v2 U 1.4.2 the tcp/ip reference model,
0 F ^$ e5 P" i6 S- H# w& R! i 1.4.3 the model used in this book,
3 ]( H+ U4 a3 ?7 c; P 1.4.4 a comparison of the osi and tcp/ip reference models,
: _; F, d0 D# n- i9 L& e 1.4.5 a critique of the osi model and protocols,3 M1 o- a' X9 F3 r- Z; c
1.4.6 a critique of the tcp/ip reference model,
+ b7 y3 q) ~ J& ]3 M 1.5 example networks,
9 O1 i: z5 K; l/ {% |4 l 1.5.1 the internet,
: L, A. _5 d: e3 K" P) B4 X6 E 1.5.2 third-generation mobile phone networks,, g3 w1 r# y; j M0 C+ p9 v! |
1.5.3 wireless lans: 802.11,9 o9 H" b" Y. N# Y
1.5.4 rfid and sensor networks,+ G& g2 F5 {" }! e$ ~: |' w5 D5 b
1.6 network standardization,
3 Q% U1 n$ ^1 v1 } 1.6.1 who’s who in the telecommunications world,
( c# L3 C( z4 }% ~5 @$ \+ _* } 1.6.2 who’s who in the international standards world,1 |2 x3 O0 P4 w# s. G q
1.6.3 who’s who in the internet standards world,: c5 C2 x1 P7 K2 o7 U |* Y! `
1.7 metric units,
- G- o! E o* e1 R! `+ B1 X- }$ [ 1.8 outline of the rest of the book,9 s: Q: m+ F9 I4 n/ p+ s; [" u
1.9 summary,
) B# s) W& j2 ~% P; D9 c2 the physical layer
1 N2 I" B& Q2 M: f0 W' q8 D 2.1 the theoretical basis for data communication,
- {' \7 [; ?# f2 z! Y, g1 ~ 2.1.1 fourier analysis,% G1 [ M6 N. D- {- h6 H
2.1.2 bandwidth-limited signals,
) O+ a4 {% @9 T" l+ A" _, a1 z 2.1.3 the maximum data rate of a channel,5 S) ]- J7 L9 _
2.2 guided transmission media,$ m7 E* x; Q/ \4 g j
2.2.1 magnetic media,5 a: I- l/ S1 m; e
2.2.2 twisted pairs,5 L3 p% `9 v) x$ ~
2.2.3 coaxial cable,+ ~( B# ]8 O0 q+ b% q* w: u3 ~1 J
2.2.4 power lines,% R: n9 y! m& P
2.2.5 fiber optics,; X3 R8 z6 h* V9 e. {! q
2.3 wireless transmission,
9 ]3 J @7 l( [& a& B 2.3.1 the electromagnetic spectrum,
$ j4 }4 Y9 a: y, z+ L 2.3.2 radio transmission,
/ s4 p& j/ S# C, n, J% U4 a 2.3.3 microwave transmission,6 W" z# W3 b% Z6 V3 W* Z- @% h/ e- E7 q
2.3.4 infrared transmission,
- h3 a, c: ^: L: h$ L 2.3.5 light transmission,3 o9 x/ H1 {3 w- g+ x) e9 h( g- A
contents?
/ q5 G2 q( V1 r) P+ T# F. S 2.4 communication satellites,0 |% F/ C$ t; P+ d, F
2.4.1 geostationary satellites,
6 g5 }9 u& F3 J! |, C 2.4.2 medium-earth orbit satellites,
3 j2 p/ C; u& ]- ]3 v 2.4.3 low-earth orbit satellites,+ K+ P6 x7 B$ o7 V7 n" _
2.4.4 satellites versus fiber," A7 u& l* ?. \& n0 f
2.5 digital modulation and multiplexing,( S ^; s' x4 V% b, j2 n8 L& j
2.5.1 baseband transmission, |8 x$ _% \0 ^- T; G2 L( X/ |
2.5.2 passband transmission,8 V1 d% Q1 f! Z: D: C6 v
2.5.3 frequency division multiplexing,
D2 `( w& {! B* J 2.5.4 time division multiplexing,
( U; G) o/ D8 N 2.5.5 code division multiplexing,
$ G" I2 ^( D4 } M- k3 Q9 d 2.6 the public switched telephone network,
& t+ W" x1 `0 y' b1 Z 2.6.1 structure of the telephone system,% T, j1 w" m* C; u5 l+ \, u
2.6.2 the politics of telephones,+ |* U, k) N( V" ?- ?, x
2.6.3 the local loop: modems, adsl, and fiber,% V) G7 U9 G' G$ g4 {' \* [% l3 O4 @
2.6.4 trunks and multiplexing,
9 w8 b6 p0 K7 F9 x+ [) _ 2.6.5 switching,+ h1 c; K/ H5 \$ a
2.7 the mobile telephone system,
( k1 n1 K ?3 d# u8 n" f m7 y 2.7.1 first-generation (1g) mobile phones: analog voice," {6 u% q$ S( R" Z4 A
2.7.2 second-generation (2g) mobile phones: digital voice,
. Y0 N4 n& s& d: A. [) Q- i; E 2.7.3 third-generation (3g) mobile phones: digital voice anddata,
. ^+ ?, h" f+ n1 C+ v+ i 2.8 cable television,
, g+ v+ ]( |$ b+ x7 r 2.8.1 community antenna television,* _4 P8 V* @/ L' o; d* }, G
2.8.2 internet over cable,
4 E) k5 D+ s5 I 2.8.3 spectrum allocation,/ P* Y6 z6 _! g1 V a K! q9 _
2.8.4 cable modems,
7 u. _) r" U+ X$ H 2.8.5 adsl versus cable,
0 @$ }' W% G2 [/ k 2.9 summary,
8 H9 S& W5 \ f# N3 the data link layer5 s6 f5 r) _ w+ I
3.1 data link layer design issues,
9 T% P" F) B/ o8 S# `: L2 `( g 3.1.1 services provided to the network layer,
& W# m! }( q+ p- I6 y, g* [ 3.1.2 framing,
' ^/ h! w2 a e% x- w' Z! {8 d& f 3.1.3 error control,
. k/ l% ~- _7 m0 y; r 3.1.4 flow control,- Z! ^; y2 y2 G
3.2 error detection and correction,. t0 I5 C9 X+ r% M
3.2.1 error-correcting codes,
/ W& c& b" C% u' U, K$ x V: z 3.2.2 error-detecting codes,
1 p9 U+ i7 U0 b5 L3 c* D 3.3 elementary data link protocols,
6 D# i- k5 t; t. ?, g 3.3.1 a utopian simplex protocol,% T' m) O( X q
3.3.2 a simplex stop-and-wait protocol for an error-freechannel,
' Z" b. S6 K% V 3.3.3 a simplex stop-and-wait protocol for a noisy channel,+ m% b$ h6 W6 A Y
3.4 sliding window protocols,) T1 Z4 P [# {) j" I6 [
3.4.1 a one-bit sliding window protocol,' p8 R; r% Q+ N0 D
3.4.2 a protocol using go-back-n,
. k/ X [8 m( V2 S/ G0 w 3.4.3 a protocol using selective repeat,
+ q' b9 ]2 w% h% u* O+ b 3.5 example data link protocols,
# b4 I) }# `, i7 e* N1 _ 3.5.1 packet over sonet,7 |2 E1 x5 A8 U6 V) P: {9 L
3.5.2 adsl (asymmetric digital subscriber loop),: g0 y; O3 O1 e. |! e
3.6 summary,% i4 C' E5 f7 D) M6 Z. K
4 the medium access control sublayer
Q% \: y/ D- c; P* Q, C 4.1 the channel allocation problem,2 K; Z4 w i4 b% I$ t0 N& g$ p( a* l
4.1.1 static channel allocation,
$ L" s) [) H; q4 ]3 j# j 4.1.2 assumptions for dynamic channel allocation,
7 A8 w8 a6 |7 H1 \+ j8 @" x# R4 n+ e 4.2 multiple access protocols,6 `! u, _+ t2 A, B2 y% T
4.2.1 aloha,
" t6 h" z2 h# F 4.2.2 carrier sense multiple access protocols,8 N2 {9 N% e& L6 y( y v* B
4.2.3 collision-free protocols,( K2 c" {; Z( Y; A( N' K8 R1 i
4.2.4 limited-contention protocols,
0 _2 s7 V0 I% \8 G, W0 I) P3 W 4.2.5 wireless lan protocols,
- ^! F" y4 `. [ Y( H' d: S ^ 4.3 ethernet,- P0 \0 O9 a) r. G9 z5 e
4.3.1 classic ethernet physical layer,
9 Y9 p+ o8 M6 a3 j/ R 4.3.2 classic ethernet mac sublayer protocol,! p; j( v- B0 J$ X
4.3.3 ethernet performance,
5 t1 {" c; B2 |( [ 4.3.4 switched ethernet,
& V5 X& ~. Y% c3 G1 ^4 h 4.4.4 the 802.11 frame structure,2 @' Q" U+ y1 G8 O
4.4.5 services,$ l! j- @+ S4 c* c, _9 g. M) Q) I
4.5 broadband wireless,( a& f5 F7 [: ~( ]/ y$ u! W, O
4.5.1 comparison of 802.16 with 802.11 and 3g,+ G( J# W9 \0 d( h1 D& E
4.5.2 the 802.16 architecture and protocol stack,
! y' v8 Y) t3 H! ^* z1 \# h' n 4.5.3 the 802.16 physical layer,) L4 h3 F2 H1 V
4.5.4 the 802.16 mac sublayer protocol,
# M: \5 f0 \% B$ W7 B! c& X 4.5.5 the 802.16 frame structure,4 Y' g d; H( n. W
4.6 bluetooth,
$ q2 i1 A" ^& g7 A9 E% | 4.6.1 bluetooth architecture,0 q" I6 X3 h* _* `; [" ]5 Q( y0 o
4.6.2 bluetooth applications,
! f- E5 g- A/ \; Y% `* S 4.6.3 the bluetooth protocol stack,
- f! s) {8 K5 T 4.6.4 the bluetooth radio layer,* J! q7 x) L, `8 r" c
4.6.5 the bluetooth link layers,
# Z" A* ]2 g @# x3 j 4.6.6 the bluetooth frame structure,# ~& G/ Z ~" n3 H1 m
4.7 rfid,
2 G! S0 `, n" @, i# E 4.7.1 epc gen 2 architecture,
% o9 [) O+ W# Z 4.7.2 epc gen 2 physical layer,
* I4 o: F; s" V! G 4.7.3 epc gen 2 tag identification layer,* K, a% I! u0 L; G. `/ b; I$ b8 @
4.7.4 tag identification message formats,
& i% \ {8 E" u5 l' |( D 4.8 data link layer switching,
- m/ O, |2 G4 v 4.8.1 uses of bridges,6 A0 W8 M- T# M! y+ u9 n4 L9 S7 N
4.8.2 learning bridges,( C# A8 J3 R6 E& S" z3 r" v
4.8.3 spanning tree bridges,- ~* o/ w" n2 l% S3 z- [5 j
4.8.4 repeaters, hubs, bridges, switches, routers, andgateways,7 @8 j+ Q$ G' h, ~
4.8.5 virtual lans,
4 r1 J3 D5 `9 C" L% M6 D# } 4.9 summary,' Y! O1 \& s& |* N% x2 _
5 the network layer
8 e8 r* e; [- K+ A 5.1 network layer design issues,
3 T& Y# {" a- I. Y7 E 5.1.1 store-and-forward packet switching,, z5 P7 Y- e; ~, q: D
5.1.2 services provided to the transport layer,
5 n: g2 ^. N4 Y! f 5.1.3 implementation of connectionless service,
7 M) r1 }% d) @) q1 Y 5.1.4 implementation of connection-oriented service,3 W. ~ ?$ J. _6 ]5 c* y7 E' D
5.1.5 comparison of virtual-circuit and datagram networks,
! e: @4 {+ h, A2 \9 G, k7 | 5.2 routing algorithms,
4 n e9 t1 f: o# O6 G8 Q) Y; m- Z 5.2.1 the optimality principle, E$ V7 Y' r" U1 D- e8 g& w
5.2.2 shortest path algorithm,4 O. m) _* w6 W( C
5.2.3 flooding,' T. j1 I) w6 K5 u8 ^$ T
5.2.4 distance vector routing,6 E, H6 k* y2 v* b) ~% l& Q
5.2.5 link state routing,
* ~* f& x6 l6 N+ _) H0 |/ H2 S 5.2.6 hierarchical routing,3 ]6 ?( ^1 Z. ^$ D7 a' B. M
5.2.7 broadcast routing,2 I% q) q. s" d0 `& ?
5.2.8 multicast routing,& m3 h9 I! O$ @2 W) R% Y" [* F
5.2.9 anycast routing,1 D& Z7 }- S4 J4 v) h( m
5.2.10 routing for mobile hosts,
% s8 Z: P5 g8 B& r+ |3 L 5.2.11 routing in ad hoc networks,0 A6 {% q( u. k) s
5.3 congestion control algorithms,. }$ u! a; F) _) u2 S
5.3.1 approaches to congestion control,7 e0 o1 m8 f( D" Q4 r7 J3 `4 z
5.3.2 traffic-aware routing,
1 H6 G7 o' {) n- u5 c% t: U2 D6 z3 g 5.3.3 admission control,+ c# Q' o& w d/ u1 I7 ]3 M1 h6 R4 H
5.3.4 traffic throttling,
) w$ t' w H' W! _: N% _ 5.3.5 load shedding,1 G6 l' B& y" i: q7 `
5.4 quality of service,6 A, l ]/ A& R$ V1 Y
5.4.1 application requirements,
6 [# c* _& E5 {5 R 5.4.2 traffic shaping, M" S& \( o/ ]0 @" t5 i; v. i
5.4.3 packet scheduling,
* j% }( ^0 r" R3 V: q' | 5.4.4 admission control,
! w. o2 `1 ~* b/ x7 g 5.4.5 integrated services,
) l; h, \$ E0 j4 X# H& K 5.4.6 differentiated services,
; g1 M! H$ C. ]+ n# [! B8 }! v 5.5 internetworking,
6 n3 I( D/ b; I# j q 5.5.1 how networks differ,
2 t+ d* E' v7 W$ G) x$ N* j1 G 5.5.2 how networks can be connected,
* Q" H) X1 m" \" E9 s. s. g: C. i 5.5.3 tunneling,2 J9 Z0 t: A1 M: @
5.5.4 internetwork routing,
* t% n# v) a) i" D0 R) b" ]# t: l 5.5.5 packet fragmentation,6 o! @5 y0 u2 Q, J; s
5.6 the network layer in the internet,5 M, v5 z% [. y7 A; s ~. d
5.6.1 the ip version 4 protocol,, z1 R6 z: o+ G$ b$ v; [( `! z
5.6.2 ip addresses,' L& d& h; K) q
5.6.3 ip version 6,
, {. R0 A# I: b/ o( H' ~, ?6 d 5.6.4 internet control protocols,* [) z9 ^! _( F+ T1 Y9 a1 |7 ?
5.6.5 label switching and mpls,7 C5 ]; C j" d& F$ n
5.6.6 ospf—an interior gateway routing protocol,
1 v( [8 W! q. K' _ 5.6.7 bgp—the exterior gateway routing protocol,
$ n6 i' K( P6 e$ J! [- \ 5.6.8 internet multicasting,9 b7 ]* t, f* M2 i
5.6.9 mobile ip,
0 @# W5 r; R8 H# U7 h7 ~( T 5.7 summary,, {! l# j+ l" [
6 the transport layer4 G/ N3 Q" z2 s/ M
6.1 the transport service,
; y+ M3 A$ u7 j. a& J 6.1.1 services provided to the upper layers,; e9 c- J2 c; `2 A( ]) z' w) Z
6.1.2 transport service primitives,3 u1 ^6 r: e p' S& R
6.1.3 berkeley sockets,3 y" E1 P* [3 }7 w! ] ?
6.1.4 an example of socket programming: an internet fileserver,
1 s6 f) R7 }1 s, _ 6.2 elements of transport protocols,2 t" Q" M& s" ]: f9 O, G
6.2.1 addressing,
0 g7 O( y6 ^' h- T. o 6.2.2 connection establishment,% x/ V. h" T; J0 o
6.2.3 connection release,6 z' E2 Q, S f# i. T
6.2.4 error control and flow control,
, ], m& ^# f& U0 X4 Y% z 6.2.5 multiplexing,. |0 w; v, x1 K! o7 x
6.2.6 crash recovery,; w9 A: R9 v2 h8 v9 C @( x
6.3 congestion control,
' n2 Q' U' Q# `$ n- v, v 6.3.1 desirable bandwidth allocation,
8 g6 r6 @" w" R! o0 x 6.3.2 regulating the sending rate,! m1 f% O* F2 p& ]$ ^4 f
6.3.3 wireless issues, F' P% v6 j- r, v
6.4 the internet transport protocols: udp,& f$ g8 F1 A/ x0 P
6.4.1 introduction to udp,
* f! u' z6 n) Q* P v, w: r 6.4.2 remote procedure call,
+ a9 g6 n0 l/ T) a5 z' v 6.4.3 real-time transport protocols,
8 t: g& z: f& h7 c 6.5 the internet transport protocols: tcp, # w5 g {9 ]" r" s9 W0 W
6.5.1 introduction to tcp,
! T e# L' K8 u" V9 H 6.5.2 the tcp service model, 4 W5 S$ [4 t3 ^2 \
6.5.3 the tcp protocol, / R6 S1 N0 L# x
6.5.4 the tcp segment header, 3 w2 e$ i, ]7 f& m; @1 d& t; B6 M
6.5.5 tcp connection establishment,
7 v. y+ z0 o7 }: A 6.5.6 tcp connection release, 5 {4 L# N: ^- I
6.5.7 tcp connection management modeling,
) v$ A) w) [9 E2 t3 z 6.5.8 tcp sliding window,
+ H" I; @* u2 C/ y( ` G; @ 6.5.9 tcp timer management,
) K) B* r+ g) S/ H2 o3 f 6.5.10 tcp congestion control,
8 W. z0 q- i! z- J" k 6.5.11 the future of tcp, s. _" u, |% y/ T
6.6 performance issues,
. b9 J0 G" g4 v3 ]& l2 A4 g 6.6.1 performance problems in computer networks,
( [! q3 p4 G) j u: ?; G 6.6.2 network performance measurement,
+ S% w# S& @) @) n4 W/ A2 @ 6.6.3 host design for fast networks, ' a% n! }) X; n
6.6.4 fast segment processing,
% t$ }& g; i) ~ 6.6.5 header compression,
4 D* w( p p3 }, L* d3 p 6.6.6 protocols for long fat networks,
7 d# { a( c% `5 |' q 6.7 delay-tolerant networking,' S$ p/ n e; e) s% ]
6.7.1 dtn architecture,! {6 ^3 L; _. r* h T2 _3 c
6.7.2 the bundle protocol,
+ O( r6 C" h( v" Z/ S 6.8 summary,( x" w) u6 I- N, s/ S
7 the application layer
* q! O* V' l4 ~2 p/ V9 O- i 7.1 dns—the domain name system,
9 O1 T( t) \6 O3 U' \2 ^ 7.1.1 the dns name space,: u8 @) @6 H/ R0 b4 h( }
7.1.2 domain resource records,; X3 f1 x3 I1 T" e n5 d
7.1.3 name servers,0 M3 w! v5 a7 t0 j; c- j" u; h
7.2 electronic mail,
3 X) d1 G1 d# g4 _* ~2 C 7.2.1 architecture and services,3 l, g- ]$ f: `0 V! }
7.2.2 the user agent,
# r2 q' A; n! A3 u% n8 l 7.2.3 message formats,
9 n- T6 \, @) k$ R8 ? 7.2.4 message transfer,% p& o6 k/ S0 e% u9 d* ^) |
7.2.5 final delivery,
, L0 ]2 X5 W9 T/ J: N 7.3 the world wide web,+ s8 R5 h- J% A8 p+ t$ X5 @) Q
7.3.1 architectural overview,
' ^: l; b1 Z2 V& y1 @2 y 7.3.2 static web pages,
3 g6 E7 B. C- Y- M 7.3.3 dynamic web pages and web applications,
1 h9 [3 `8 q m0 a/ E 7.3.4 http—the hypertext transfer protocol, w+ `& O. o0 u L: \( g9 T+ E
7.3.5 the mobile web,, b! v$ U2 |- r; Z+ Q2 Z
7.3.6 web search,
/ p7 m1 E8 C, E2 w" T3 g% ]5 d+ S% E 7.4 streaming audio and video,
( P9 b: e6 L1 X* `, W+ f6 m' g 7.4.1 digital audio,* h c- r0 O$ B3 v
7.4.2 digital video,
5 {: V6 z# R' {' B6 T2 O2 K9 _7 R" D 7.4.3 streaming stored media,
9 F6 ~8 x1 p) a" n 7.4.4 streaming live media,
# Q( \: V1 @5 t' }2 Z/ _ 7.4.5 real-time conferencing,
5 M8 B$ p& Y, `: x d. M3 F& v& z0 M 7.5 content delivery,/ S1 J/ j z& n9 m
7.5.1 content and internet traffic,
! ], A2 U, e5 U2 ` 7.5.2 server farms and web proxies,
% x, W) E$ `9 s/ [ 7.5.3 content delivery networks,' F9 B4 W9 |& x$ M( Z5 {; Z1 U
7.5.4 peer-to-peer networks,
3 p1 W* w- C ~ 7.6 summary,
3 \+ z8 p: n$ Q) S: c: X1 s8 network security/ N/ G% |0 Z7 a2 A! c
8.1 cryptography,
[5 H; a Q9 \5 Q" W 8.1.1 introduction to cryptography,8 s9 ]1 d' u' k, q, H
8.1.2 substitution ciphers,
" T3 @! _8 k# z& b6 U 8.1.3 transposition ciphers,
7 V4 H6 Q7 t) t) q0 J8 f 8.1.4 one-time pads,
" Z+ s" X% @- ^6 v1 X* J" S/ ^* Z8 W 8.1.5 two fundamental cryptographic principles,
9 o: P; S) ~4 Z8 T. ` 8.2 symmetric-key algorithms,* W, W! r" A9 P6 ]% A7 ~
8.2.1 des—the data encryption standard,% t# A: U/ O5 C' ?
8.2.2 aes—the advanced encryption standard,
) P) P2 c2 I# m& _ 8.2.3 cipher modes,' ?8 ~' F5 a- R7 M X2 q
8.2.4 other ciphers,
' v7 A! h. b* T4 u. b8 O 8.2.5 cryptanalysis,9 V9 V+ ?! o/ p
20?contents; O0 H% M1 Q5 Z& s
8.3 public-key algorithms,
. a. @( I4 y* o" R6 e7 l 8.3.1 rsa,) o6 h- o; U4 i3 L& w; Z0 Q
8.3.2 other public-key algorithms,
2 T* n( ~0 f8 f 8.4 digital signatures,
0 r8 q7 D! z- V- A; @ 8.4.1 symmetric-key signatures,
* A2 E' K: X; z* I 8.4.2 public-key signatures,1 {/ t5 v) |7 X
8.4.3 message digests,' M! n+ n* V" m( t( [
8.4.4 the birthday attack,* U) J+ A& `8 q3 c8 ?4 x& A7 \) y- [
8.5 management of public keys,0 L1 j+ _/ s7 h
8.5.1 certificates,9 M% m7 C/ }: a1 G Z
8.5.2 x.509,3 \7 j% t6 \6 O' o* z$ R( C0 I8 c- b
8.5.3 public key infrastructures,) X, ]/ F* t; D7 S, u9 V# J) N
8.6 communication security,) F+ [6 l' W2 `6 r* i( p, C! ~# ?
8.6.1 ipsec, L9 U: R- M. ^; \9 `
8.6.2 firewalls,# d, M7 l9 N A; c1 s- F
8.6.3 virtual private networks,
' l5 l# w( x# ]2 O, _' w( ~# G 8.6.4 wireless security,
) U, O1 U' `& K3 ^: R 8.7 authentication protocols,$ q9 U3 o4 q& t$ z; e7 p* l
8.7.1 authentication based on a shared secret key,
2 g7 d8 I4 G6 O d, u* { 8.7.2 establishing a shared key: the diffie-hellman keyexchange,
0 s& Q V6 Z3 h+ D8 \( c 8.7.3 authentication using a key distribution center,$ n |! z! s J0 G# Z- z7 K3 i
8.7.4 authentication using kerberos,9 ?6 x3 x* F+ }' g3 S
8.7.5 authentication using public-key cryptography," [6 {* ?6 D# }" {6 _; Y" }
8.8 email security,
3 \ n6 h( Z; C7 t* J. n) D* x 8.8.1 pgp—pretty good privacy,+ Y2 V$ D4 [' W9 Q9 o2 T
8.8.2 s/mime,
) V( G! y/ G$ b; V+ h 8.9 web security,6 |4 C7 N5 k- \: W( F
8.9.1 threats,, s4 S1 _& x8 p/ |, j6 y0 a
8.9.2 secure naming,
9 N( o) l+ L; w 8.9.3 ssl—the secure sockets layer,
6 q0 L% b& r, l! x0 U# p1 ` 8.9.4 mobile code security,
; U# l; @( i1 Q! `9 K* N 8.10 social issues,: { {. i# c" s- w' e# p* y
8.10.1 privacy,+ E& y, Q$ m6 t* F: D
8.10.2 freedom of speech,
2 P4 T2 d. i* W4 d8 E4 p 8.10.3 copyright,7 t% n8 @) ~7 V* G
8.11 summary,
, B- e0 g; w$ s$ a9 reading list and bibliography
0 k2 D5 G, Y& P8 S5 ^! Y# X 9.1 suggestions for further reading,
; E# U- o! \, d1 z- H 9.1.1 introduction and general works,
+ @8 ~5 n5 ]3 t( g2 ? 9.1.2 the physical layer,8 m2 K0 G. j- L# e
9.1.3 the data link layer,
1 A" |4 J9 j4 S/ Y 9.1.4 the medium access control sublayer,
1 l/ J0 d/ P" l( f% X 9.1.5 the network layer,1 X+ c* @0 @* L0 ?, c* O. N) E: _8 Y, V
9.1.6 the transport layer,' I0 [6 Q( i9 J7 i8 i
9.1.7 the application layer,
& \/ l5 D* |5 M8 A( x R0 N- } 9.1.8 network security,% P) F* i- p- v( E7 l4 S
9.2 alphabetical bibliography,- {8 q* X) q! K* b# M+ t5 `. X
index
! e, y; D U0 ?- o0 ^" o0 K
6 o# K1 ]6 ?$ ~ ^" O7 tJava资料百度网盘下载地址链接(百度云):java自学网(javazx.com) 计算机网络(英文版第5版) PDF 高清 电子书 百度云.rar【密码回帖可见】
; ` Z8 O, x: H- t2 X
% A. r+ P# L" F& j
9 D. J" z( M" p% E+ ?, {6 |5 @% F' K/ g
1 p6 [. j M' q; F, G |
|