Current location - Quotes Website - Personality signature - Brief introduction of computer network security
Brief introduction of computer network security
Machinery industry press

This book takes network security application technology as the main line, introduces computer network security knowledge step by step, and pays attention to the cultivation of students' practical application skills and practical ability. The book is divided into 9 chapters, covering basic knowledge of network, computer virus, encryption and digital signature technology, operating system vulnerabilities, firewall technology, port scanning technology, intrusion detection and WLAN security. This book is informative, easy to understand, case-centered, and combines many experiences and skills.

This book can be used as a teaching material for computer and related majors in major vocational colleges, and also as a guide for network security administrators.

order

The rapid development of computer network technology and the increasing popularity of network system applications have brought great changes to people's mode of production, lifestyle and way of thinking. However, the computer network system is an open system with many unsafe factors. How to ensure the security of computers and information in the network is an important and complicated problem. At present, the research on network security is not only for information and data security, but also involves various fields of national development.

It is the responsibility of network educators to cultivate talents who not only master the basic theoretical knowledge of computer network, but also master the practical application skills of computer network. Especially for students majoring in computer science in colleges and universities, a textbook with a certain level of theoretical knowledge and strong practical application technology is needed.

Based on the guiding ideology of cultivating applied talents of network security, this book focuses on the application technology of network security on the basis of introducing the theoretical knowledge of network security to a certain extent, and pays attention to the cultivation of students' practical application skills and practical ability.

This book is divided into 9 chapters, including: basic knowledge of computer network security, characteristics of network security threats, basic knowledge of network security protection and security strategies (chapter 1);

Basic knowledge of computer network protocols, application of network protocols in network security architecture, common network commands and protocol analyzers (Chapter 2);

Basic operating skills such as the characteristics of computer viruses, the classification and transmission ways of computer viruses, the detection and defense methods of computer viruses (Chapter III);

Working principle of encryption algorithm, digital signature technology, public key infrastructure (PKI), CA, working principle and related concepts of digital certificate, application of PGP tool software, SSL secure transmission, application configuration of secure website (Chapter 4);

The function, implementation technology, working mode and implementation mode of firewall (Chapter 5);

Network security composition, account policy, access control configuration and application of security template of Windows Server 2003 operating system (Chapter 6);

The concept of port, the working principle of various port scanning technologies, the application methods of common port scanning tools and the application of port scanning prevention technology (Chapter 7);

Model and workflow of intrusion detection system, classification and working principle of intrusion detection system, host-based intrusion detection system and network-based intrusion detection system deployment (Chapter 8);

This paper introduces the composition, standards and implementation of WLAN security (Chapter 9).

This book is written by Andy, Song, Rolling, Liu Yuanyuan, He Shuiyan, Li Xiaoquan and Liu Zhen of Wuhan Secondary Vocational Art School in wuhan vocational college of software and engineering. Wan Gang presided over the book and gave guidance and help in the writing process.

Due to the rapid development of computer network security technology and limited editing level, the shortcomings in the book are inevitable. Please give your valuable opinions.