TA的每日心情 | 开心 2018-4-8 22:14 |
---|
签到天数: 1 天 [LV.1]初学乍练
普通会员
- 积分
- 5517
|
java自学网(www.javazx.com)-java论坛,java电子书推荐:《 计算机网络(英文版第5版)》
" C3 F' ^3 `, e1 n& @+ n- `java电子书推荐理由:全球**有权威性和经典性的计算机网络教材 作者Andrew S. Tanenbaum是国际知名的计算机科学家 更多经典图书 : 《深入理解计算机系统(英文版第2版)》点击进入 《编译原理(英文版第2版)》点击进入 《数据结构与算法分析――C语言描述(英文版第2版)》点击进入 《Java编程思想(英文版第4版)》点击进入 《Linux内核设计与实现(英文版.第3版)》点击进入
1 U( k' x8 ]1 ~0 v9 [+ o: A$ |% g' X7 N1 e" D9 }
作者:Andrew S.Tanenbaum David J.Wetherall
: s4 l) ~7 ~1 i) Q+ j- _出版社:机械工业出版社* o* H8 j/ o0 k$ H' h& S: c5 C& b3 {
出版时间:2011-10-01 ; \+ F7 C4 q- |# s
书籍价格:76.20元
( {5 O4 Q( x6 ], d5 f/ v
3 d; {; Z4 k7 y& j& h$ S. H8 c: K; q8 w1 K
) T! B) w* r& \! Q6 i9 @: n
8 B+ K. m9 {0 }: l8 w3 O/ Zjava电子书目录:
3 r2 {' }- D" ~: E4 z. K% \) h5 t1 introduction
) f4 o0 v4 r' K6 ~# R- v 1.1 uses of computer networks,
% d4 a- Z2 _/ [ 1.1.1 business applications,4 f, n" r2 h" K
1.1.2 home applications,* @9 }* l. R; J' X8 h3 ]
1.1.3 mobile users,
, U0 J' [. e0 [1 n 1.1.4 social issues,. ?" O* i. }' H2 D+ f/ N/ L7 V) _
1.2 network hardware,
* m& i. g# x9 t8 j0 F( {; E 1.2.1 personal area networks,& P2 B; I' l( D
1.2.2 local area networks,8 G- Y. i1 z E. i( u
1.2.3 metropolitan area networks,
8 X O# i' C: J1 b6 z 1.2.4 wide area networks,# a' v, T! h( ]0 u& e
1.2.5 internetworks,# e K( q& Y2 _' N* ?8 a
1.3 network software,
8 }+ f& B$ @% m, b/ `1 T 1.3.1 protocol hierarchies,
/ G% Y9 ]- ?- I9 D4 |* X 1.3.2 design issues for the layers,
3 M; ~# t6 o) |) T) T D 1.3.3 connection-oriented versus connectionless service,; k1 \ Y/ `, \; e) b
1.3.4 service primitives,
7 T- v9 H: `: e4 U, P* P3 m 1.3.5 the relationship of services to protocols,# c! F- P' ?% l8 v1 R. O6 c
1.4 reference models,3 z- e' x: Z' z, i
1.4.1 the osi reference model,
5 O8 I4 |" B1 M. h5 K 1.4.2 the tcp/ip reference model,1 |8 m& K! p. `) q) y7 W
1.4.3 the model used in this book,* ^- ]0 Q; [, ?' i6 M7 Q
1.4.4 a comparison of the osi and tcp/ip reference models,# i7 P" {2 n4 D/ Q* N! [& ~
1.4.5 a critique of the osi model and protocols,
" Z& L$ w, ~4 T& E' Z4 K 1.4.6 a critique of the tcp/ip reference model,1 o3 e4 M3 U7 m3 o
1.5 example networks,, m# c5 i& C- \( o( {9 E
1.5.1 the internet,% } G2 }0 i* s! I8 W& z) g6 [
1.5.2 third-generation mobile phone networks,% B' i9 e) t j Y9 r- X# h9 o n
1.5.3 wireless lans: 802.11,* ]& L1 G& q* }! R7 Q
1.5.4 rfid and sensor networks,# ~, @# M5 t% z/ Y9 @- H9 C
1.6 network standardization,9 t! T: U+ I, \' [" O- C* V) h
1.6.1 who’s who in the telecommunications world,; N& [$ i! b% F" v
1.6.2 who’s who in the international standards world,
( }0 l8 r9 J' s9 ?3 b; b 1.6.3 who’s who in the internet standards world,/ \ H: P, B9 k- A& `
1.7 metric units,
# |4 x; p S) B# H 1.8 outline of the rest of the book,
1 J( x) {- c3 O! O 1.9 summary,! i( y6 J0 t6 m, ~ c+ n
2 the physical layer9 J7 k, K( b& n+ X0 U
2.1 the theoretical basis for data communication,
% \( {" R) ^5 ]: X$ S6 d/ ?! { 2.1.1 fourier analysis,5 E1 y0 i- k+ P: Y7 P# c
2.1.2 bandwidth-limited signals,
6 P0 B3 _" v& m: s 2.1.3 the maximum data rate of a channel,
+ ^6 d, R. N+ n 2.2 guided transmission media,
1 N. r: u* p2 ?' y) p" T 2.2.1 magnetic media,
) i- G) N2 g8 z2 _+ k2 ^ 2.2.2 twisted pairs,
+ E( f4 ^0 a, r1 I7 C0 t K 2.2.3 coaxial cable,
1 p/ g$ K4 t8 `, ?. z0 p2 T 2.2.4 power lines,
( d4 J7 G* j! _: f! `& u- q* J 2.2.5 fiber optics,( V' \0 M- O+ P+ M2 |* K
2.3 wireless transmission,
- ~/ ?/ b1 O; K 2.3.1 the electromagnetic spectrum,
$ x0 S% _2 ]2 ` 2.3.2 radio transmission,) v. H `2 Q" l6 ?+ |0 m
2.3.3 microwave transmission,
% Y. t& F% y' f8 a' ]( V 2.3.4 infrared transmission,
& \" Y9 b) X& n4 v 2.3.5 light transmission,
& T# V" ]8 ~" T contents?
. p+ M J5 N6 I" ]/ m 2.4 communication satellites,
6 y+ V3 p" ~- T& J( v 2.4.1 geostationary satellites,
1 F, y+ R) q2 m; c0 p 2.4.2 medium-earth orbit satellites,
9 w; r% _6 l7 g 2.4.3 low-earth orbit satellites,
/ v2 `! P+ z- B# W" N. e+ | 2.4.4 satellites versus fiber,
* [5 B0 X1 U$ I p4 H1 |; I 2.5 digital modulation and multiplexing,
: N+ m, v" F6 |+ Z 2.5.1 baseband transmission,5 _4 C3 r+ X5 {1 P. q4 t
2.5.2 passband transmission,3 O0 a. ]3 x5 V8 l" ?4 B
2.5.3 frequency division multiplexing,
( x8 @: X5 I8 l 2.5.4 time division multiplexing,7 _7 K! B1 F0 g3 a9 N, `2 h
2.5.5 code division multiplexing,- x7 ^9 m' F, h; a7 B5 W0 [
2.6 the public switched telephone network,% E3 M f& Z( Z9 I6 \
2.6.1 structure of the telephone system,
: V$ y1 k0 \4 |, {, ^& U 2.6.2 the politics of telephones,# \+ h( c* i$ W4 O& f4 N/ m
2.6.3 the local loop: modems, adsl, and fiber,8 D2 O; {* p, K& ^( N b9 O
2.6.4 trunks and multiplexing,
# X c% L* w! K: @1 ~& A2 D 2.6.5 switching,% S7 I* J) B4 n
2.7 the mobile telephone system,$ _4 e( @6 C# v! {& u8 Q# `: L) Q1 E
2.7.1 first-generation (1g) mobile phones: analog voice,: M' c4 T' ^0 ^* @/ w$ ~
2.7.2 second-generation (2g) mobile phones: digital voice,4 O3 q) ^% ^# L( W
2.7.3 third-generation (3g) mobile phones: digital voice anddata,8 B. b e7 T/ Z7 Q4 L6 g
2.8 cable television,1 |& n; V/ K" m% g
2.8.1 community antenna television,
0 f. r* \) k: J/ g9 a* P7 N3 l$ t 2.8.2 internet over cable,
$ c6 Z1 M( U5 s) j( { 2.8.3 spectrum allocation,4 A3 B* F0 w! ]
2.8.4 cable modems,
" ^0 `% u9 T: R$ a/ u 2.8.5 adsl versus cable,
2 i9 f7 U2 g9 y 2.9 summary,
( h$ @0 h1 V2 q3 the data link layer. H, X4 t: t A& w$ a" a5 [
3.1 data link layer design issues,: W, Y* _) u7 v6 h6 m( q
3.1.1 services provided to the network layer,
- h. `$ ]9 p1 L* H; f 3.1.2 framing,% ~- d- y/ b1 a2 o
3.1.3 error control,
% `8 P! \$ J" I8 s; J& T+ l 3.1.4 flow control,! |" i6 [. ]% f0 B3 Q
3.2 error detection and correction, `+ w$ c1 @/ r( m, f
3.2.1 error-correcting codes,
3 Y" U& `4 p) m/ ^ 3.2.2 error-detecting codes,4 p( R0 |9 u, J0 i7 ~
3.3 elementary data link protocols,! W6 B% U/ }0 p1 Z" N
3.3.1 a utopian simplex protocol,
1 u f+ O% R/ W& N7 O! d5 O 3.3.2 a simplex stop-and-wait protocol for an error-freechannel,1 ]- t! ^' s7 T. ~- Z
3.3.3 a simplex stop-and-wait protocol for a noisy channel,
0 d, }0 ] [. H% I0 K2 Y' J7 c 3.4 sliding window protocols,
2 q' T' w! L; U5 c6 Q) X$ x 3.4.1 a one-bit sliding window protocol,3 s- D) j" L6 `2 \/ }+ \. O4 y; J
3.4.2 a protocol using go-back-n,
% w3 T& w, n# s `) q3 J 3.4.3 a protocol using selective repeat,$ F; g4 A& [' k
3.5 example data link protocols,
7 O- g: k; \6 F- z2 f 3.5.1 packet over sonet,, k+ @$ f4 }9 E Z
3.5.2 adsl (asymmetric digital subscriber loop),
7 M) M/ `5 b7 h 3.6 summary,
' k8 J( N3 W* m, S( E7 f/ j$ w2 I+ l# G4 the medium access control sublayer$ c2 M! x: m& p
4.1 the channel allocation problem,3 e% g0 s1 p% ~! u2 i' o' g
4.1.1 static channel allocation,! @4 |3 V8 [; e
4.1.2 assumptions for dynamic channel allocation,
9 h1 u: t- Y# n: f) o4 b/ a 4.2 multiple access protocols,4 r+ i5 ]" m' f
4.2.1 aloha,7 q2 v4 ^; w: G; e. t! o8 a
4.2.2 carrier sense multiple access protocols,
1 c5 [- Y8 u* }" y$ w3 t 4.2.3 collision-free protocols,
, d8 k/ {2 W; }4 w R- | 4.2.4 limited-contention protocols,1 |3 }+ K# P3 l" F0 ^$ M
4.2.5 wireless lan protocols,& T( b8 y( }0 P" }$ ~! N
4.3 ethernet,
: c3 c: F5 e0 {% Q% t. Y) ^ 4.3.1 classic ethernet physical layer,6 \* c+ s% Q% K: Z
4.3.2 classic ethernet mac sublayer protocol,
. i2 X4 f* `0 F' D 4.3.3 ethernet performance,& `4 P7 N" F, W. \9 U
4.3.4 switched ethernet,
, t" Z3 O0 ?3 {. A* p 4.4.4 the 802.11 frame structure,9 S9 s! @1 ~1 _& ?7 q# \9 n
4.4.5 services,0 @* p) } P( ?1 U' \5 v8 X
4.5 broadband wireless,: l7 n1 |7 g9 K1 U I. V
4.5.1 comparison of 802.16 with 802.11 and 3g,
. l8 l; a* A: `9 p$ w/ J( ^ 4.5.2 the 802.16 architecture and protocol stack,1 I; ?& f6 d9 X; _, S
4.5.3 the 802.16 physical layer,& A: i" q4 W: Z4 m8 u
4.5.4 the 802.16 mac sublayer protocol,
( s1 F h9 ?5 F 4.5.5 the 802.16 frame structure,
. Z. w. V1 q1 l2 o 4.6 bluetooth,
' H! Z) E) a q E: d- d 4.6.1 bluetooth architecture,1 U" k( O% z% v9 \$ {
4.6.2 bluetooth applications,
& U/ z3 W" \2 C! Y. K 4.6.3 the bluetooth protocol stack,& _7 S ?+ j, \# j @
4.6.4 the bluetooth radio layer,7 h' V2 _% e @2 d7 U
4.6.5 the bluetooth link layers,
# {6 O4 h2 D: k T 4.6.6 the bluetooth frame structure,
3 ^) r) S( K* F1 M! ?7 p1 ` 4.7 rfid,% g- a3 s) A I+ z0 l8 x% _1 y1 r
4.7.1 epc gen 2 architecture,
1 g9 v9 v! j. L: l: } 4.7.2 epc gen 2 physical layer,
& V& }" b' Q, U0 W 4.7.3 epc gen 2 tag identification layer,
) l, ^: r4 O7 F' |3 Z/ h 4.7.4 tag identification message formats,8 {. Z7 i" K2 D+ |( B: N
4.8 data link layer switching,
, D; }, X7 \& y* Z% F" K 4.8.1 uses of bridges,7 e9 o! Z' Y, K5 l a
4.8.2 learning bridges,
3 A- L! r( n/ D. M! E$ E 4.8.3 spanning tree bridges,
( W# V3 T# u% v 4.8.4 repeaters, hubs, bridges, switches, routers, andgateways,
" I* S( b2 M; F. P2 M 4.8.5 virtual lans,
1 r$ |" L6 X- N* g( u 4.9 summary,
9 P8 a7 e" G2 ]5 the network layer# b; {. t: y* r+ ]' t
5.1 network layer design issues,/ x1 K# j" y/ _ ]/ s
5.1.1 store-and-forward packet switching,& N, X/ Z9 Y( o. _1 m
5.1.2 services provided to the transport layer,
3 v m) A6 v7 m& Z) W 5.1.3 implementation of connectionless service,6 e% b4 N, P# I* p
5.1.4 implementation of connection-oriented service,
4 r" y+ b( ?7 j$ ^3 r0 U0 n. o2 d$ ` 5.1.5 comparison of virtual-circuit and datagram networks,
& w& |. h N2 [" j7 { 5.2 routing algorithms,& G/ V: Q9 b: {9 ?5 O: w& e
5.2.1 the optimality principle,
2 F; G. S( N! l9 q, p8 V 5.2.2 shortest path algorithm,, T# A# M( E+ y0 }0 y
5.2.3 flooding,
, E, m7 c0 ], c& I/ T9 n+ ? 5.2.4 distance vector routing,$ ?7 M6 C @' l, l9 u3 \6 C7 `( G" @
5.2.5 link state routing,
! C0 x( U$ e/ S' } 5.2.6 hierarchical routing,# V' n" f, M$ s$ V! m
5.2.7 broadcast routing,7 |' m9 r6 z# [
5.2.8 multicast routing,
' v! o3 l7 n" z) i- H 5.2.9 anycast routing,
+ i/ D8 N. y' E& q, v6 e 5.2.10 routing for mobile hosts,
0 A/ r* ?/ g+ Y 5.2.11 routing in ad hoc networks,: z8 F; a4 ^ [2 u0 O( W. h8 N
5.3 congestion control algorithms,
3 R# f2 t. Q$ `% k3 | { 5.3.1 approaches to congestion control,
- H6 I. [& z* Z/ ]) C K 5.3.2 traffic-aware routing,
! w5 ] h3 x& Z 5.3.3 admission control, ^6 J a K; R) Q( l6 M3 _( j
5.3.4 traffic throttling,
$ c# U4 ?# A7 Q4 G# q" h 5.3.5 load shedding,
* Q3 H0 y9 H, x; y 5.4 quality of service, z7 u5 o. Z8 {# _! Z
5.4.1 application requirements,
, [# V3 H) C4 k! N, W1 w! R) e 5.4.2 traffic shaping,
% s6 f7 U4 K, ^# B( c 5.4.3 packet scheduling,
: Z' E$ n) G6 x$ c8 u/ z% G 5.4.4 admission control,
& f0 w7 L( H% ] 5.4.5 integrated services,
; T" j: \4 P4 F1 l 5.4.6 differentiated services,: O( V' \9 @. Y: G1 X
5.5 internetworking,
; o r% N, K! A; ?5 ]1 D 5.5.1 how networks differ,
6 `8 P3 ^+ G- `9 K8 M0 L& U7 d 5.5.2 how networks can be connected,8 k, } z+ H* E$ L
5.5.3 tunneling,* i+ }1 F2 B' |7 i. [/ @
5.5.4 internetwork routing,
4 k$ g5 d; k8 T! w; Z& s0 ] 5.5.5 packet fragmentation,6 F' ~+ m s5 i8 k
5.6 the network layer in the internet,5 m H) k- {# [4 A8 ?1 g2 M( a
5.6.1 the ip version 4 protocol,8 f3 K4 x6 p5 l) ^5 c. j5 W
5.6.2 ip addresses,+ N' {; |9 y$ s$ `' u
5.6.3 ip version 6,
8 d, F6 h- h/ M: P# D 5.6.4 internet control protocols,
) F$ g6 Q" z% X) f V0 ` 5.6.5 label switching and mpls,
1 V* {( `9 p$ {9 l 5.6.6 ospf—an interior gateway routing protocol,, T5 x. g# w4 Z8 ^
5.6.7 bgp—the exterior gateway routing protocol,
) b& \1 d0 {1 h0 U- d% F! S6 U 5.6.8 internet multicasting,6 K2 N- Q& C& W( G4 k
5.6.9 mobile ip,
: R0 p' z8 P$ R* ^ T. |1 H/ {7 I 5.7 summary,
( z8 p' ]& j1 k5 w- L" c6 the transport layer
. s+ s2 U+ N7 N& ?$ Q+ _ 6.1 the transport service,
0 l% E# X. @- w& _ ~ 6.1.1 services provided to the upper layers,3 E# u# m- Z' ^% u
6.1.2 transport service primitives,
3 Q0 O8 |; v" ^4 ]1 G' a 6.1.3 berkeley sockets,
5 D% k) R) ?6 z 6.1.4 an example of socket programming: an internet fileserver,0 I) O$ ^3 o( n! ^$ _+ D
6.2 elements of transport protocols,. h& b0 S. e" j; V/ i/ ^9 s
6.2.1 addressing,
* C) v. s4 X' x( R 6.2.2 connection establishment,3 D x1 q) l8 b4 u6 [
6.2.3 connection release,
0 D' ?1 R. H* Q: N: {0 @ 6.2.4 error control and flow control,) S- g% o6 s8 u/ a# ?( ]* V' O% \
6.2.5 multiplexing,
" X2 e7 V, \! z6 g0 y( P 6.2.6 crash recovery,
. x; `) g5 }1 e5 a V 6.3 congestion control,
: A* J3 { t. v2 `/ ~6 {, ^! R 6.3.1 desirable bandwidth allocation,
# x3 Q) O- W1 ^( @ 6.3.2 regulating the sending rate,8 m! w! c* K9 q j
6.3.3 wireless issues,
! r8 w0 s0 c6 @% j! `1 X! b5 h6 ? 6.4 the internet transport protocols: udp,
5 T8 d, _7 Q; {, h# u6 b) D 6.4.1 introduction to udp,
1 u/ L5 Q. W" e& j9 c( C" h 6.4.2 remote procedure call,, }. ~+ A6 S/ G0 c5 M( d. |
6.4.3 real-time transport protocols,
+ Q- T- Y# f3 [" |- c8 A, T 6.5 the internet transport protocols: tcp, $ E9 N& b% n/ C- k* h$ l! C
6.5.1 introduction to tcp,
9 }% {4 b0 n7 E! z1 v* J 6.5.2 the tcp service model, 0 T$ n; K: F! H; c. ?, {
6.5.3 the tcp protocol, . B9 T/ i4 G9 O$ N1 k# v' D
6.5.4 the tcp segment header, % `6 q' y5 `6 V" O* W: `2 f
6.5.5 tcp connection establishment,
5 h( p c# d* l# [0 p 6.5.6 tcp connection release, 8 s1 _+ {, \6 D# y2 H6 S3 s8 r
6.5.7 tcp connection management modeling,
8 S& o3 p" l5 g8 ? 6.5.8 tcp sliding window, . @+ Y) R% k8 v3 z0 X$ w1 S
6.5.9 tcp timer management, , L# G" H( y2 g
6.5.10 tcp congestion control, 3 [& z1 [" j Z
6.5.11 the future of tcp, & f/ s3 t: m; C) L: h* y, Y4 ?1 A
6.6 performance issues, . \0 l7 l$ F3 d$ S# R( s
6.6.1 performance problems in computer networks,
* \, p7 d" D. n$ M 6.6.2 network performance measurement,
0 I: N, P1 V E t3 V' {. Q4 _& u b- @ 6.6.3 host design for fast networks,
% P; O4 z) Y# D; M$ j. N% n+ f 6.6.4 fast segment processing, D* d0 y5 M7 d
6.6.5 header compression,
, G4 n. u" G- v3 \3 e- Q 6.6.6 protocols for long fat networks,
1 f/ w! K* f. R3 T. t8 W& I 6.7 delay-tolerant networking," O/ c) b1 ?8 z( s- Y
6.7.1 dtn architecture,
9 p S. \1 v) X 6.7.2 the bundle protocol,
3 f/ s+ `- t0 M) v/ N 6.8 summary,
( f; G& ~2 Y' J) D. t( u7 the application layer
! k, L% V; f h 7.1 dns—the domain name system,/ a' d; |) s- v) U
7.1.1 the dns name space,9 S0 ^: B6 w- M' R, h5 K
7.1.2 domain resource records,- b4 ], g( T- `, [. n# c
7.1.3 name servers,
" k7 k- G/ R! }7 u4 p, w 7.2 electronic mail,
% \- u5 ~# x" ?5 z 7.2.1 architecture and services,+ F# m( A9 ^! _7 l* \+ m) a) P4 V) p/ u
7.2.2 the user agent,( r9 n4 E, K$ D) r- P
7.2.3 message formats, K4 Y+ F) S2 ^, P( B
7.2.4 message transfer,
( C9 s3 y, ?+ M+ ?# B* c Y0 \ 7.2.5 final delivery," w Y' q7 p" Y0 B
7.3 the world wide web,; A- P; [( I4 w* K" x
7.3.1 architectural overview,: e+ G" I: P( |2 @. R
7.3.2 static web pages,( ^9 z& j0 V( `
7.3.3 dynamic web pages and web applications,: d! t6 m- Z% q4 |: l1 J. P- n
7.3.4 http—the hypertext transfer protocol,
O* Q" P" u0 a. ]6 g+ b 7.3.5 the mobile web,) S2 o" y+ s' w. h* N/ X4 F: A
7.3.6 web search,4 F* ^7 l% p+ s5 Q. U# G% ^4 M
7.4 streaming audio and video,
j3 N8 `' a, `2 o* i8 s& S 7.4.1 digital audio,# O0 l# r/ {/ Z1 D$ S
7.4.2 digital video,' {* g. h# v) a% m5 N' o6 k
7.4.3 streaming stored media,
: v. V, P6 q' n0 ? 7.4.4 streaming live media,, W2 O8 X9 g6 t: a9 [9 |* w( s' y
7.4.5 real-time conferencing,
8 K, e- h. m* O% G; Z 7.5 content delivery,
8 K4 J! y- T9 \ r) C 7.5.1 content and internet traffic,
' K3 `; R6 d( I+ N! }7 r4 f& {- h 7.5.2 server farms and web proxies,
/ ~& |$ r1 v$ ]1 Z5 f" W( ~ 7.5.3 content delivery networks,
4 u% t1 N$ g: ?" Q 7.5.4 peer-to-peer networks,6 s' _% N4 z8 |* m6 r8 o
7.6 summary,' [0 }, J9 i0 T3 x/ B
8 network security3 J1 X. V$ E2 G! R7 g$ t) z
8.1 cryptography,7 \9 X5 C3 N* ]" h
8.1.1 introduction to cryptography,
! T) n3 L% w3 i2 ?9 H6 \ 8.1.2 substitution ciphers,& D+ h7 \9 I8 V: K2 {
8.1.3 transposition ciphers,# F$ L2 {* @; b/ V
8.1.4 one-time pads,
$ F: r+ f3 ?+ k! X 8.1.5 two fundamental cryptographic principles,. C* q# m- E% D# v
8.2 symmetric-key algorithms,
2 V7 f' a% @: r% T8 J 8.2.1 des—the data encryption standard,, P. U$ z8 x4 E1 k0 I: ]1 h$ G
8.2.2 aes—the advanced encryption standard,
( w2 ?0 w2 k. ^$ x/ u 8.2.3 cipher modes,6 r" q; J, J; Y6 g
8.2.4 other ciphers,: s8 K! Z1 `( m8 T( Y4 N( d# e
8.2.5 cryptanalysis,# s$ O# s% ^% G& M% t0 ~) S
20?contents6 \6 I) {5 j" Y0 v
8.3 public-key algorithms,, W5 t3 L* h; t. ~6 U
8.3.1 rsa,
' z) k: N7 i% t( x$ E 8.3.2 other public-key algorithms,
' l1 R, t; @# w& X" S- X 8.4 digital signatures,
! ^% {0 b$ Z4 S 8.4.1 symmetric-key signatures,! S( L, y) ]9 ~ z
8.4.2 public-key signatures,0 x2 C h% L% ]/ }6 M; W. q+ D
8.4.3 message digests,* G& i$ z% l4 U: g) h- }# @
8.4.4 the birthday attack,4 R0 C; C8 W- ]7 A
8.5 management of public keys,
4 F; q4 _! W- G* m0 B0 c9 f/ F 8.5.1 certificates,; B# }$ l" ~( S' S$ _# v
8.5.2 x.509,
, Q0 q. x1 t3 O) u3 t 8.5.3 public key infrastructures,
0 v1 X5 h4 [% z6 H! F7 y5 ?" R* J 8.6 communication security,
/ [- `' z$ ]6 T' p' P3 d4 U | 8.6.1 ipsec,! t$ y* x; A9 D7 V
8.6.2 firewalls,; d& o8 d) B0 \
8.6.3 virtual private networks,
( } p z+ T% k8 r4 D# x 8.6.4 wireless security,
0 B9 f5 l0 g* L& k+ U& k 8.7 authentication protocols,3 N- x# D1 [8 D; O' U$ I" O
8.7.1 authentication based on a shared secret key,
; \4 Y2 C' B% u \ 8.7.2 establishing a shared key: the diffie-hellman keyexchange,8 ^9 v- r* O9 \
8.7.3 authentication using a key distribution center,5 E# F% k x2 R
8.7.4 authentication using kerberos,
( f& H. o/ P. B5 O2 P Z 8.7.5 authentication using public-key cryptography,
9 F1 c/ B6 x& k2 O1 ~" d9 | 8.8 email security,( C" g( w) S# Y$ c
8.8.1 pgp—pretty good privacy,- D. w4 u& q7 S' U( R) W. _- D* U( i/ h
8.8.2 s/mime,
0 ]/ r0 O) s$ s4 D Y, \& U 8.9 web security,
/ y* X) x6 Y* C! w 8.9.1 threats,$ N5 S4 L3 |% N' S! o7 P+ G
8.9.2 secure naming,
- w+ w" {- y, D% P6 ]- z# |4 a 8.9.3 ssl—the secure sockets layer,
9 C5 ], P$ x' f& u/ [" T* x0 k1 u 8.9.4 mobile code security,1 B6 [% v5 m: o
8.10 social issues,
$ P% p8 w/ X) ~& P* m" \* C 8.10.1 privacy,
1 V! T O& g. t 8.10.2 freedom of speech,; i: D' W6 [' w" ?( g* h6 f( X9 D
8.10.3 copyright,, t3 v7 ~, e8 k0 I
8.11 summary,6 R. v2 o1 Z" G' e/ i
9 reading list and bibliography: \ d& @5 \1 u9 H: ^9 u: b# t
9.1 suggestions for further reading,
$ E1 q& X# X. C7 P0 P 9.1.1 introduction and general works,
& u0 h/ B+ d0 Y3 q8 V1 J 9.1.2 the physical layer,
6 V5 l2 |4 D6 \: p 9.1.3 the data link layer,
% R, b( ^8 Y: F' ~ 9.1.4 the medium access control sublayer,
M! q2 ?4 N# W$ a 9.1.5 the network layer,. ~1 l' T2 U; A. I# e
9.1.6 the transport layer,
- C, k3 t& d( H7 W+ } 9.1.7 the application layer,. S7 Z) j i) V+ U- h! j
9.1.8 network security,
5 w0 U" a# j# Z) Y) @1 b2 S3 r5 m 9.2 alphabetical bibliography,( n; y8 Y- v0 s: E' C/ N
index
/ [/ h9 P% k" _* D9 M+ e1 Q/ m. b( ^! [
Java资料百度网盘下载地址链接(百度云):java自学网(javazx.com) 计算机网络(英文版第5版) PDF 高清 电子书 百度云.rar【密码回帖可见】
0 { I9 }% n @ M' F
; n; Z! U1 T. ~7 J; [7 n% |. V2 t' T7 x$ j0 Z# e: O3 ]- t: r1 e
+ h7 T7 G' z8 ]
4 P3 l( U( i- L) d- C4 Z7 X9 ?/ u- W |
|